CVE-2017-8342

HIGH

Radicale < 1.1.1 - Race Condition

Title source: rule
STIX 2.1

Description

Radicale before 1.1.2 and 2.x before 2.0.0rc2 is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method.

References (5)

Core 5
Core References
Release Notes, Third Party Advisory x_refsource_confirm
https://github.com/Kozea/Radicale/blob/1.1.2/NEWS.rst
Exploit, Issue Tracking, Patch, VDB Entry x_refsource_confirm
https://bugs.debian.org/861514
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/04/msg00019.html

Scores

CVSS v3 8.1
EPSS 0.0073
EPSS Percentile 72.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-362
Status published
Products (3)
pypi/Radicale 0 - 1.1.2PyPI
radicale/radicale 2.0.0 rc1
radicale/radicale < 1.1.1
Published Apr 30, 2017
Tracked Since Feb 18, 2026