{"id":"PYSEC-2016-36","details":"The multifilesystem storage backend in Radicale before 1.1 allows remote attackers to read or write to arbitrary files via a crafted component name.","aliases":["CVE-2015-8747","GHSA-fgqv-96v9-w23m"],"modified":"2024-04-29T16:56:45.494907Z","published":"2016-02-03T18:59:00Z","references":[{"type":"FIX","url":"https://github.com/Unrud/Radicale/commit/bcaf452e516c02c9bed584a73736431c5e8831f1"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3462"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/01/05/7"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/01/06/4"},{"type":"WEB","url":"https://github.com/Kozea/Radicale/pull/343"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/01/06/7"},{"type":"WEB","url":"http://www.securityfocus.com/bid/80255"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175776.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175738.html"},{"type":"PACKAGE","url":"https://pypi.org/project/radicale"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8747"}],"affected":[{"package":{"name":"radicale","ecosystem":"PyPI","purl":"pkg:pypi/radicale"},"ranges":[{"type":"GIT","repo":"https://github.com/Unrud/Radicale","events":[{"introduced":"0"},{"fixed":"bcaf452e516c02c9bed584a73736431c5e8831f1"}]},{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1"}]}],"versions":["0.10","0.2","0.3","0.4","0.5","0.6","0.6.1","0.6.2","0.6.3","0.6.4","0.7","0.7.1","0.8","0.9","0.9b1","0.9b2","1.0","1.0.1"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/radicale/PYSEC-2016-36.yaml"}}],"schema_version":"1.7.3"}