[Japanese]

JVNDB-2015-000107

yoyaku_v41 vulnerable to arbitrary file creation

Overview

yoyaku_v41 provided by Webservice-DIC is a software to manage conference room reservations. yoyaku_v41 contains a vulnerability that may allow a remote attacker to create arbitrary files (CWE-20).

Shoji Baba reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 7.5 (High) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial

Affected Products


Webservice-DIC
  • yoyaku_v41

Impact

An arbitrary file created by an attacker may result in arbitrary code being executed on the server.
Solution

[Do not use yoyaku_v41]
yoyaku_v41 is no longer being developed or maintained. It is recommended to stop using yoyaku_v41.
Vendor Information

Webservice-DIC
CWE (What is CWE?)

  1. Improper Input Validation(CWE-20) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2015-2977
References

  1. JVN : JVN#46674982
  2. National Vulnerability Database (NVD) : CVE-2015-2977
Revision History

[2015/07/29]
  Web page was published
[2015/07/30]
  References : Content was added