Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04NGN3LW14aHYtcXZ2NM4AAdCH

Radicale is vulnerable to directory traversal on Windows Filesystem Storage Backend component

The filesystem storage backend in Radicale before 1.1 on Windows allows remote attackers to read or write to arbitrary files via a crafted path, as demonstrated by /c:/file/ignore.

Permalink: https://github.com/advisories/GHSA-84cw-mxhv-qvv4
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04NGN3LW14aHYtcXZ2NM4AAdCH
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 2 years ago
Updated: over 1 year ago


CVSS Score: 10.0
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

EPSS Percentage: 0.00484
EPSS Percentile: 0.76503

Identifiers: GHSA-84cw-mxhv-qvv4, CVE-2016-1505
References: Repository: https://github.com/Kozea/Radicale
Blast Radius: 14.8

Affected Packages

pypi:Radicale
Dependent packages: 4
Dependent repositories: 30
Downloads: 10,485 last month
Affected Version Ranges: < 1.1
Fixed in: 1.1
All affected versions: 0.6.1, 0.6.2, 0.6.3, 0.6.4, 0.7.1, 1.0.1
All unaffected versions: 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 2.0.0, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.9, 2.1.10, 2.1.11, 2.1.12, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.3.0, 3.3.1