[Japanese]
|
JVNDB-2018-000099
|
Cybozu Garoon vulnerable to directory traversal
|
Cybozu Garoon provided by Cybozu, Inc. contains a directory traversal vulnerability (CWE-22) due to a flaw in processing of the session information.
Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Cybozu, Inc. coordinated under the Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 6.4 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
CVSS V2 Severity: Base Metrics 5.5 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: Single Instance
- Confidentiality Impact: Partial
- Integrity Impact: Partial
- Availability Impact: None
|
|
Cybozu, Inc.
- Cybozu Garoon 3.5.0 to 4.6.3
|
|
A user who can login to the product may obtain or alter arbitrary files on the server.
|
[Apply the Patch]
Apply the patch according to the information provided by the developer.
[Updated on 2019 April 22]
[Update the Software]
Update to the latest version according to the information provided by the developer.
According to developer, this vulnerability was addressed in Cybozu Garoon 4.10.0.
|
Cybozu, Inc.
|
- Path Traversal(CWE-22) [IPA Evaluation]
|
- CVE-2018-0673
|
- JVN : JVN#12583112
- National Vulnerability Database (NVD) : CVE-2018-0673
|
- [2018/09/10]
Web page was published
- [2019/04/22]
Solution was modified
- [2019/07/26]
References : Content was added
|