Janetter vulnerable to cross-site request forgery


Janetter contains a cross-site request forgery vulnerability.

Janetter is a client software for using Twitter. Janetter contains a cross-site request forgery vulnerability.

Kazuhiko Kusano of Graduate School of Information Sciences, Tohoku University reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products

Jane, Inc.
  • Janetter (mac_os) versions prior to 3.3.0
  • Janetter (windows) versions prior to


When a malicious page is opened with a web browser while Janetter is being used, the user may be impersonated to post tweets, upload local image files, and OS commands may be executed with the privileges of Janetter.

[Update the software]
Update to the latest version according to the information provided by the developer.

According to the developer, the Windows version of Janetter contains an automatic update feature. This feature automatically updates Janetter once a day.
Vendor Information

Jane, Inc.
CWE (What is CWE?)

  1. Cross-Site Request Forgery(CWE-352) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2012-1236

  1. JVN : JVN#83459967
  2. National Vulnerability Database (NVD) : CVE-2012-1236
Revision History

  • [2012/03/19]
      Web page was published