[Japanese]

JVNDB-2016-000098

TERASOLUNA Server Framework for Java(WEB) access restriction bypass vulnerability in the file extention filter

Overview

The TERASOLUNA Server Framework for Java(WEB) provided by NTT Data Corporation is a software framework for creating web applications. The TERASOLUNA Server Framework for Java(WEB) has a function to restrict access to contents with specified file extentions from browser requests. This function may be bypassed when a specially crafted path is received.

NTT Data Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and NTT Data Corporation coordinated under the Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 3.7 (Low) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: None
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: None
  • Availability Impact: None
Affected Products


NTT DATA
  • TERASOLUNA Server Framework for Java(Web) versions 2.0.0.1 through 2.0.6.1

Impact

Effects vary depending on the web application. For example, a remote attacker may obtain information on the server where the product resides.
Solution

[Apply the update module]
The developer has released an update module (PI-SJW-261-1) for TERASOLUNA Server Framework for Java(WEB) versions 2.0.0.1 through 2.0.6.1.
Apply the update module according to the information provided by the developer.
Vendor Information

NTT DATA FUJITSU
CWE (What is CWE?)

  1. Permissions(CWE-264) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2016-1183
References

  1. JVN : JVN#74659077
  2. National Vulnerability Database (NVD) : CVE-2016-1183
Revision History

  • [2016/06/07]
      Web page was published
    [2016/06/27]
      References : Content was added