Description
Radicale before 1.1.2 and 2.x before 2.0.0rc2 is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method.
References (5)
Core 5
Core References
Release Notes, Third Party Advisory x_refsource_confirm
https://github.com/Kozea/Radicale/blob/1.1.2/NEWS.rst
Patch, Third Party Advisory x_refsource_confirm
https://github.com/Kozea/Radicale/commit/059ba8dec1f22ccbeab837e288b3833a099cee2d
Patch, Third Party Advisory x_refsource_confirm
https://github.com/Kozea/Radicale/commit/190b1dd795f0c552a4992445a231da760211183b
Exploit, Issue Tracking, Patch, VDB Entry x_refsource_confirm
https://bugs.debian.org/861514
Mailing List mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/04/msg00019.html
Scores
CVSS v3
8.1
EPSS
0.0073
EPSS Percentile
72.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-362
Status
published
Products (3)
pypi/Radicale
0 - 1.1.2PyPI
radicale/radicale
2.0.0 rc1
radicale/radicale
< 1.1.1
Published
Apr 30, 2017
Tracked Since
Feb 18, 2026