[Japanese]

JVNDB-2012-000027

Janetter vulnerable to cross-site request forgery

Overview

Janetter contains a cross-site request forgery vulnerability.

Janetter is a client software for using Twitter. Janetter contains a cross-site request forgery vulnerability.

Kazuhiko Kusano of Graduate School of Information Sciences, Tohoku University reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


Jane, Inc.
  • Janetter (mac_os) versions prior to 3.3.0
  • Janetter (windows) versions prior to 3.3.0.0

Impact

When a malicious page is opened with a web browser while Janetter is being used, the user may be impersonated to post tweets, upload local image files, and OS commands may be executed with the privileges of Janetter.
Solution

[Update the software]
Update to the latest version according to the information provided by the developer.

According to the developer, the Windows version of Janetter contains an automatic update feature. This feature automatically updates Janetter once a day.
Vendor Information

Jane, Inc.
CWE (What is CWE?)

  1. Cross-Site Request Forgery(CWE-352) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2012-1236
References

  1. JVN : JVN#83459967
  2. National Vulnerability Database (NVD) : CVE-2012-1236
Revision History

  • [2012/03/19]
      Web page was published