CVE-2019-18347
Published: 4 December 2019
A stored XSS issue was discovered in DAViCal through 1.1.8. It does not adequately sanitize output of various fields that can be set by unprivileged users, making it possible for JavaScript stored in those fields to be executed by another (possibly privileged) user. Affected database fields include Username, Display Name, and Email.
Priority
Status
Package | Release | Status |
---|---|---|
davical Launchpad, Ubuntu, Debian |
impish |
Not vulnerable
(1.1.9.2-1)
|
groovy |
Not vulnerable
(1.1.9.2-1)
|
|
hirsute |
Not vulnerable
(1.1.9.2-1)
|
|
jammy |
Not vulnerable
(1.1.9.2-1)
|
|
xenial |
Needed
|
|
lunar |
Not vulnerable
(1.1.9.2-1)
|
|
bionic |
Needed
|
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Not vulnerable
(1.1.9.2-1)
|
|
kinetic |
Not vulnerable
(1.1.9.2-1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.1.9.2-1)
|
|
mantic |
Not vulnerable
(1.1.9.2-1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.4 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |