[Japanese]

JVNDB-2021-000013

Wekan vulnerable to cross-site scripting

Overview

Wekan, open source kanban board system, is vulnerable to cross-site scripting (CWE-79).
This vulnerability is treated as one of multiple cross-site scripting vulnerabilities, named "Fieldbleed".

Ryoya Koyama at Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 5.4 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: Required
  • Scope: Changed
  • Confidentiality Impact: Low
  • Integrity Impact: Low
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 3.5 (Low) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: Single Instance
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


Wekan project
  • Wekan versions between 3.12 and 4.11

Impact

When a logged-in user store malicious value containing Javascript code to the system, that JavaScript code may be executed on another logged-in user's web browser.
Solution

[Update the Software]
Update the software to the latest version according to the information provided by the developer.

The developer states that Fieldbleed is fixed on version 4.12.
Vendor Information

Wekan project
CWE (What is CWE?)

  1. Cross-site Scripting(CWE-79) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2021-20654
References

  1. JVN : JVN#80785288
  2. National Vulnerability Database (NVD) : CVE-2021-20654
Revision History

  • [2021/02/10]
      Web page was published