Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mZ3F2LTk2djktdzIzbc4AActG
Radicale vulnerable to arbitrary file read or write
The multifilesystem storage backend in Radicale before 1.1 allows remote attackers to read or write to arbitrary files via a crafted component name.
Permalink: https://github.com/advisories/GHSA-fgqv-96v9-w23mJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mZ3F2LTk2djktdzIzbc4AActG
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 2 years ago
Updated: 3 months ago
CVSS Score: 10.0
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
EPSS Percentage: 0.00514
EPSS Percentile: 0.76979
Identifiers: GHSA-fgqv-96v9-w23m, CVE-2015-8747
References:
- https://nvd.nist.gov/vuln/detail/CVE-2015-8747
- https://github.com/Kozea/Radicale/pull/343
- https://github.com/Unrud/Radicale/commit/bcaf452e516c02c9bed584a73736431c5e8831f1
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175738.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175776.html
- http://www.debian.org/security/2016/dsa-3462
- http://www.openwall.com/lists/oss-security/2016/01/05/7
- http://www.openwall.com/lists/oss-security/2016/01/06/4
- http://www.openwall.com/lists/oss-security/2016/01/06/7
- https://github.com/Kozea/Radicale/commit/18c88642fb19ee1480690e51fff9605ecc6fdab5
- https://web.archive.org/web/20200804235922/http://www.securityfocus.com/bid/80255
- https://github.com/pypa/advisory-database/tree/main/vulns/radicale/PYSEC-2016-36.yaml
- https://github.com/advisories/GHSA-fgqv-96v9-w23m
Blast Radius: 14.8
Affected Packages
pypi:Radicale
Dependent packages: 4Dependent repositories: 30
Downloads: 8,818 last month
Affected Version Ranges: < 1.1
Fixed in: 1.1
All affected versions: 0.6.1, 0.6.2, 0.6.3, 0.6.4, 0.7.1, 1.0.1
All unaffected versions: 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 2.0.0, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.9, 2.1.10, 2.1.11, 2.1.12, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.4.0