{"id":"PYSEC-2016-37","details":"Radicale before 1.1 allows remote authenticated users to bypass owner_write and owner_only limitations via regex metacharacters in the user name, as demonstrated by \".*\".","aliases":["CVE-2015-8748","GHSA-6w8c-6jrg-qwj2"],"modified":"2024-04-29T17:11:23.172001Z","published":"2016-02-03T18:59:00Z","references":[{"type":"FIX","url":"https://github.com/Unrud/Radicale/commit/4bfe7c9f7991d534c8b9fbe153af9d341f925f98"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3462"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/01/05/7"},{"type":"WEB","url":"https://github.com/Kozea/Radicale/pull/341"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/01/06/4"},{"type":"WEB","url":"http://www.securityfocus.com/bid/80255"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175776.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175738.html"},{"type":"PACKAGE","url":"https://pypi.org/project/radicale"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8748"}],"affected":[{"package":{"name":"radicale","ecosystem":"PyPI","purl":"pkg:pypi/radicale"},"ranges":[{"type":"GIT","repo":"https://github.com/Unrud/Radicale","events":[{"introduced":"0"},{"fixed":"4bfe7c9f7991d534c8b9fbe153af9d341f925f98"}]},{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1"}]}],"versions":["0.10","0.2","0.3","0.4","0.5","0.6","0.6.1","0.6.2","0.6.3","0.6.4","0.7","0.7.1","0.8","0.9","0.9b1","0.9b2","1.0","1.0.1"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/radicale/PYSEC-2016-37.yaml"}}],"schema_version":"1.7.3"}