[Japanese]
|
JVNDB-2018-000130
|
Cybozu Garoon access restriction bypass vulnerability
|
Single sign-on function of Cybozu Garoon provided by Cybozu, Inc. contains a restriction bypass vulnerability (CWE-284).
Kanta Nishitani reported this vulnerability to Cybozu, Inc., and Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Cybozu, Inc. coordinated under the Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 7.5 (High) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
CVSS V2 Severity: Base Metrics 5.0 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
|
|
Cybozu, Inc.
- Cybozu Garoon 3.0.0 to 4.10.0
|
|
An attacker who can access the product may bypass authentication of Single sign-on function and view the information which is available only for sign-on users.
|
[Apply the Patch]
Apply the patch according to the information provided by the developer.
[Updated on 2019 April 22]
[Update the Software]
Update to the latest version according to the information provided by the developer.
According to developer, this vulnerability was addressed in Cybozu Garoon 4.10.1.
|
Cybozu, Inc.
|
- Permissions(CWE-264) [IPA Evaluation]
|
- CVE-2018-16178
|
- JVN : JVN#25385698
- National Vulnerability Database (NVD) : CVE-2018-16178
|
- [2018/12/10]
Web page was published
- [2019/04/22]
Solution was modified
- [2019/08/27]
References : Content was added
|