[Japanese]
|
JVNDB-2017-000202
|
Multiple vulnerabilities in Cybozu Garoon
|
Cybozu Garoon provided by Cybozu, Inc. contains multiple vulnerabilities listed below.
* Denial-of-service (DoS) vulnerability in the application menu's edit function (CWE-20) - CVE-2017-2254
* Stored cross-site scripting in the "Rich text" function of the application "Space" (CWE-79) - CVE-2017-2255
* Stored cross-site scripting in the "Rich text" function of the application "Memo" (CWE-79) - CVE-2017-2256
* Cross-site scripting in the mail function (CWE-79) - CVE-2017-2257
* Directory traversal in the Garoon SOAP API "WorkflowHandleApplications" (CWE-22) - CVE-2017-2258
Cybozu, Inc. reported CVE-2017-2258 vulnerability to JPCERT/CC to notify users of its solution through JVN.
Jun Kokatsu reported CVE-2017-2254 vulnerability to Cybozu, Inc., and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
Masato Kinugawa reported CVE-2017-2255, CVE-2017-2256 and CVE-2017-2257 vulnerabilities to Cybozu, Inc., and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
|
CVSS V3 Severity: Base Metrics 5.5 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: High
CVSS V2 Severity: Base Metrics 5.5 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: Single Instance
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: Partial
The above CVSS base scores have been assigned for CVE-2017- 2254.
|
CVSS V3 Severity:
Base Metrics:
5.4 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Changed
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
CVSS V2 Severity:Base Metrics:
4.0 (Low)
[IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: Single
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
The above CVSS base scores have been assigned for CVE-2017-2255.
|
CVSS V3 Severity:
Base Metrics:
5.4 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Changed
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
CVSS V2 Severity:Base Metrics:
4.0 (Low)
[IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: Single
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
The above CVSS base scores have been assigned for CVE-2017-2256.
|
CVSS V3 Severity:
Base Metrics:
6.1 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
CVSS V2 Severity:Base Metrics:
5.0 (Medium)
[IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
The above CVSS base scores have been assigned for CVE-2017-2257.
|
CVSS V3 Severity:
Base Metrics:
4.3 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
CVSS V2 Severity:Base Metrics:
4.0 (Low)
[IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: Single
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
The above CVSS base scores have been assigned for CVE-2017-2258.
|
|
Cybozu, Inc.
- Cybozu Garoon 3.0.0 to 4.2.5 (CVE-2017-2256, CVE-2017-2257)
- Cybozu Garoon 3.5.0 to 4.2.5 (CVE-2017-2254)
- Cybozu Garoon 3.7.0 to 4.2.5 (CVE-2017-2255)
- Cybozu Garoon 4.2.4 to 4.2.5 (CVE-2017-2258)
|
|
* An attacker may be able to cause a denial-of-service (DoS) - CVE-2017-2254
* An arbitrary script may be executed on the logged-in user's web browser - CVE-2017-2255, CVE-2017-2256, CVE-2017-2257
* An attacker may check the presence of a directory on the server - CVE-2017-2258
|
[Update the Software]
Update to the latest version according to the information provided by the developer.
|
Cybozu, Inc.
|
- Improper Input Validation(CWE-20) [IPA Evaluation]
- Path Traversal(CWE-22) [IPA Evaluation]
- Cross-site Scripting(CWE-79) [IPA Evaluation]
|
- CVE-2017-2254
- CVE-2017-2255
- CVE-2017-2256
- CVE-2017-2257
- CVE-2017-2258
|
- JVN : JVN#63564682
- National Vulnerability Database (NVD) : CVE-2017-2254
- National Vulnerability Database (NVD) : CVE-2017-2255
- National Vulnerability Database (NVD) : CVE-2017-2256
- National Vulnerability Database (NVD) : CVE-2017-2257
- National Vulnerability Database (NVD) : CVE-2017-2258
|
- [2017/08/21]
Web page was published
[2018/02/14]
References : Contents were added
|