[Japanese]
|
JVNDB-2020-000027
|
Cybozu Garoon contains multiple vulnerabilities
|
Cybozu Garoon provided by Cybozu, Inc. contains multiple vulnerabilities listed below.
*Authentication bypass in the API used to specify the fields (CWE-287) - CVE-2020-5563
*Cross-site scripting in the application "E-mail" (CWE-79) - CVE-2020-5564
*Input validation bypass in the applications "Workflow" and "MultiReport" (CWE-20) - CVE-2020-5565
*Improper authorization process in the applications "E-mail" and "Messages" (CWE-285) - CVE-2020-5566
*Improper authentication in Application Menu (CWE-287) - CVE-2020-5567
*Cross-site scripting in the applications "Messages" and "Bulletin Board" (CWE-79) - CVE-2020-5568
Cybozu, Inc. reported the following vulnerabilities to JPCERT/CC to notify users of the solution through JVN.
CVE-2020-5563, CVE-2020-5566 and CVE-2020-5568 by Cybozu, Inc.
CVE-2020-5564 by Masato Kinugawa
CVE-2020-5565 by Tanghaifeng
CVE-2020-5567 by Shuichi Uruma
|
CVSS V3 Severity: Base Metrics 5.3 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
CVSS V2 Severity: Base Metrics 5.0 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
The above CVSS base scores have been assigned for CVE-2020-5563
|
CVSS V3 Severity:
Base Metrics:
4.7 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: High
-
Privileges Required: None
-
User Interaction: Required
-
Scope: Changed
-
Confidentiality Impact: Low
-
Integrity Impact: Low
-
Availability Impact: None
CVSS V2 Severity:Base Metrics:
2.6 (Low)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: High
-
Authentication: None
-
Confidentiality Impact: None
-
Integrity Impact: Partial
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2020-5564
|
CVSS V3 Severity:
Base Metrics:
4.3 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: Low
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: None
-
Integrity Impact: Low
-
Availability Impact: None
CVSS V2 Severity:Base Metrics:
4.0 (Low)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: Single
-
Confidentiality Impact: None
-
Integrity Impact: Partial
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2020-5565
|
CVSS V3 Severity:
Base Metrics:
4.3 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: Low
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: None
-
Integrity Impact: Low
-
Availability Impact: None
CVSS V2 Severity:Base Metrics:
4.0 (Low)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: Single
-
Confidentiality Impact: None
-
Integrity Impact: Partial
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2020-5566
|
CVSS V3 Severity:
Base Metrics:
5.3 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: Low
-
Integrity Impact: None
-
Availability Impact: None
CVSS V2 Severity:Base Metrics:
5.0 (Medium)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2020-5567
|
CVSS V3 Severity:
Base Metrics:
6.1 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: Required
-
Scope: Changed
-
Confidentiality Impact: Low
-
Integrity Impact: Low
-
Availability Impact: None
CVSS V2 Severity:Base Metrics:
2.6 (Low)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: High
-
Authentication: None
-
Confidentiality Impact: None
-
Integrity Impact: Partial
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2020-5568
|
|
Cybozu, Inc.
- Cybozu Garoon 4.0.0 to 4.10.3(CVE-2020-5563, CVE-2020-5564, CVE-2020-5565, CVE-2020-5566, CVE-2020-5567)
- Cybozu Garoon 4.6.0 to 5.0.0(CVE-2020-5568)
|
According to the deveroper, CVE-2020-5566 affects the applications "E-mail" and "Messages" in Cybozu Garoon 4.0.0 to 4.0.2, and "Messages" in Cybozu Garoon 4.0.3 to 4.10.3.
|
*A remote attacker with access to the API provided by the product may obtain data of the product - CVE-2020-5563
*An arbitrary script may be executed on the user's web browser - CVE-2020-5564, CVE-2020-5568
*A user may alter applications' data - CVE-2020-5565, CVE-2020-5566
*A remote attacker may obtain data of Application Menu - CVE-2020-5567
|
[Update the Software]
Update to the latest version according to the information provided by the developer.
|
Cybozu, Inc.
|
- Improper Input Validation(CWE-20) [IPA Evaluation]
- Permissions(CWE-264) [IPA Evaluation]
- Cross-site Scripting(CWE-79) [IPA Evaluation]
|
- CVE-2020-5563
- CVE-2020-5564
- CVE-2020-5565
- CVE-2020-5566
- CVE-2020-5567
- CVE-2020-5568
|
- JVN : JVN#35649781
- National Vulnerability Database (NVD) : CVE-2020-5563
- National Vulnerability Database (NVD) : CVE-2020-5564
- National Vulnerability Database (NVD) : CVE-2020-5565
- National Vulnerability Database (NVD) : CVE-2020-5566
- National Vulnerability Database (NVD) : CVE-2020-5567
- National Vulnerability Database (NVD) : CVE-2020-5568
|
- [2020/04/28]
Web page was published
|