[Japanese]
|
JVNDB-2020-000071
|
Cybozu Garoon vulnerable to improper input validation
|
Cybozu Garoon provided by Cybozu, Inc. contains an improper input validation vulnerability (CWE-20).
Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Cybozu, Inc. coordinated under the Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 4.3 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
CVSS V2 Severity: Base Metrics 4.0 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: Single Instance
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
|
|
Cybozu, Inc.
- Cybozu Garoon 5.0.0 to 5.0.2
|
|
A user who can login to the product may delete some data of the bulletin board.
|
[Update the software and Apply the patch]
Update the software to Cybozu Garoon version 5.0.2, and then apply the patch according to the information provided by the developer.
[Updated on 2021 August 2]
[Update the Software]
The developer has released the version that contains a fix for this vulnerability.
Update to the latest version according to the information provided by the developer.
|
Cybozu, Inc.
|
- Improper Input Validation(CWE-20) [IPA Evaluation]
|
- CVE-2020-5643
|
- JVN : JVN#57942454
- National Vulnerability Database (NVD) : CVE-2020-5643
|
- [2020/11/05]
Web page was published
- [2021/08/02]
Solution : Content was added
|