Description
A CSRF issue was discovered in DAViCal through 1.1.8. If an authenticated user visits an attacker-controlled webpage, the attacker can send arbitrary requests in the name of the user to the application. If the attacked user is an administrator, the attacker could for example add a new admin user.
References (10)
Core 10
Core References
Product x_refsource_misc
https://www.davical.org/
Release Notes, Third Party Advisory x_refsource_misc
https://gitlab.com/davical-project/davical/blob/master/ChangeLog
Exploit, Third Party Advisory x_refsource_misc
https://hackdefense.com/publications/cve-2019-18346-davical-caldav-server-vulnerability/
Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Dec/17
Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Dec/19
Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Dec/18
Third Party Advisory x_refsource_misc
http://packetstormsecurity.com/files/155629/DAViCal-CalDAV-Server-1.1.8-Cross-Site-Request-Forgery.html
Mailing List mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/12/msg00016.html
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2019/dsa-4582
Mailing List mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Dec/30
Scores
CVSS v3
8.8
EPSS
0.0111
EPSS Percentile
78.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-352
Status
published
Products (1)
davical/davical
< 1.1.8
Published
Dec 04, 2019
Tracked Since
Feb 18, 2026