The filesystem storage backend in Radicale before 1.1 on Windows allows remote attackers to read or write to arbitrary files via a crafted path, as demonstrated by /c:/file/ignore.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2016/01/05/7 - | |
References | () http://www.openwall.com/lists/oss-security/2016/01/06/4 - | |
References | () http://www.openwall.com/lists/oss-security/2016/01/06/7 - | |
References | () http://www.openwall.com/lists/oss-security/2016/01/07/7 - | |
References | () http://www.securityfocus.com/bid/80255 - | |
References | () https://github.com/Kozea/Radicale/pull/343 - Patch | |
References | () https://github.com/Unrud/Radicale/commit/b4b3d51f33c7623d312f289252dd7bbb8f58bbe6 - |
Information
Published : 2016-02-03 18:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1505
Mitre link : CVE-2016-1505
CVE.ORG link : CVE-2016-1505
JSON object : View
Products Affected
radicale
- radicale
microsoft
- windows
CWE
CWE-21
DEPRECATED: Pathname Traversal and Equivalence Errors