[Japanese]

JVNDB-2016-000189

"Project" function in Cybozu Office vulnerable vulnerable to operation restriction bypass

Overview

Cybozu Office provided by Cybozu,Inc. contains an operation restriction bypass vulnerability in the "Project" function.

Yuji Tounai reported this vulnerability to Cybozu, Inc., and Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Cybozu, Inc. coordinated under the Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: None
  • Integrity Impact: Low
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 4.0 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication: Single Instance
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


Cybozu, Inc.
  • Cybozu Office 9.0.0 to 10.4.0

Impact

A user may alter the project information which the user does not have permission to access.
Solution

[Update the Software]
Update to the latest version according to the information provided by the developer.
Vendor Information

Cybozu, Inc.
CWE (What is CWE?)

  1. Permissions(CWE-264) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2016-4873
References

  1. JVN : JVN#07148816
  2. National Vulnerability Database (NVD) : CVE-2016-4873
Revision History

  • [2016/10/03]
      Web page was published
    [2017/04/24]
      References : Content was added