A CSRF issue was discovered in DAViCal through 1.1.8. If an authenticated user visits an attacker-controlled webpage, the attacker can send arbitrary requests in the name of the user to the application. If the attacked user is an administrator, the attacker could for example add a new admin user.
                
            References
                    | Link | Resource | 
|---|---|
| https://gitlab.com/davical-project/davical/blob/master/ChangeLog | Release Notes Third Party Advisory | 
| https://www.davical.org/ | Product | 
| https://hackdefense.com/publications/cve-2019-18346-davical-caldav-server-vulnerability/ | Exploit Third Party Advisory | 
| http://seclists.org/fulldisclosure/2019/Dec/18 | Third Party Advisory | 
| http://seclists.org/fulldisclosure/2019/Dec/17 | Third Party Advisory | 
| http://seclists.org/fulldisclosure/2019/Dec/19 | Third Party Advisory | 
| http://packetstormsecurity.com/files/155629/DAViCal-CalDAV-Server-1.1.8-Cross-Site-Request-Forgery.html | Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2019/12/msg00016.html | |
| https://www.debian.org/security/2019/dsa-4582 | |
| https://seclists.org/bugtraq/2019/Dec/30 | 
Configurations
                    Information
                Published : 2019-12-04 10:15
Updated : 2019-12-14 00:15
NVD link : CVE-2019-18346
Mitre link : CVE-2019-18346
JSON object : View
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
Products Affected
                davical
- davical
 


