[Japanese]
|
JVNDB-2021-001123
|
Multiple vulnerabilities in GROWI
|
GROWI provided by WESEEK, Inc. contains multiple vulnerabilities listed below.
Stored Cross-site Scripting (CWE-79) - CVE-2021-20667
Path Traversal (CWE-22) - CVE-2021-20668
Path Traversal (CWE-22) - CVE-2021-20669
Improper Access Control (CWE-284) - CVE-2021-20670
Improper Input Validation (CWE-20) - CVE-2021-20671
Site Scripting (CWE-79) - CVE-2021-20829
stypr of Flatt Security Inc. reported these vulnerabilities to the developer and coordinated on his own.
After coordination was completed, this case was reported to JPCERT/CC, and JPCERT/CC coordinated with the developer for the publication.
|
CVSS V3 Severity: Base Metrics 3.7 (Low) [Other]
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
The above CVSS base scores have been assigned for CVE-2021-20667
|
CVSS V3 Severity:
Base Metrics:
3.0 (Low) [Other]
-
Attack Vector: Network
-
Attack Complexity: High
-
Privileges Required: High
-
User Interaction: None
-
Scope: Changed
-
Confidentiality Impact: Low
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2021-20668
|
CVSS V3 Severity:
Base Metrics:
6.2 (Medium) [Other]
-
Attack Vector: Network
-
Attack Complexity: High
-
Privileges Required: High
-
User Interaction: Required
-
Scope: Changed
-
Confidentiality Impact: None
-
Integrity Impact: Low
-
Availability Impact: High
The above CVSS base scores have been assigned for CVE-2021-20669
|
CVSS V3 Severity:
Base Metrics:
5.8 (Medium) [Other]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Changed
-
Confidentiality Impact: Low
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2021-20670
|
CVSS V3 Severity:
Base Metrics:
7.6 (High) [Other]
-
Attack Vector: Network
-
Attack Complexity: High
-
Privileges Required: High
-
User Interaction: Required
-
Scope: Changed
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
The above CVSS base scores have been assigned for CVE-2021-20671
|
CVSS V3 Severity:
"Base Metrics:4.6 (Medium) [Other]"
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact:
The above CVSS base scores have been assigned for CVE-2021-20829
|
|
WESEEK, Inc.
- GROWI versions v4.2.2 and earlier
- GROWI versions v4.2.19 and earlier
|
|
* Inadequate CSP (Content Security Policy) configuration allows a remote attacker to execute an arbitrary script on the web browser of the user who accesses an attached file containing a specially crafted content - CVE-2021-20667
* An arbitrary path can be read if a remote attacker with administrative privilege accesses the affected product via a specially crafted URL - CVE-2021-20668
* An arbitrary path can be read and/or deleted if a remote attacker with administrative privilege sends a specially crafted request - CVE-2021-20669
* Improper access control of files allows an unauthenticated remote attacker to read the user's personal information and/or server's internal information - CVE-2021-20670
* Invalid file validation on the upload feature allows a remote attacker with administrative privilege to overwrite the files on the server, which may lead to arbitrary code execution - CVE-2021-20671
* Inadequate tag sanitization allows a remote attacker to execute an arbitrary script on the web browser of the user who accesses a specially crafted page - CVE-2021-20829
|
[Update the Software]
Update the software to the latest version according to the information provided by the developer.
According to the developer, these vulnerabilities were fixed in the following software version.
* GROWI v4.2.20
|
WESEEK, Inc.
|
- Improper Input Validation(CWE-20) [Other]
- Path Traversal(CWE-22) [Other]
- Improper Access Control(CWE-284) [Other]
- Cross-site Scripting(CWE-79) [Other]
|
- CVE-2021-20667
- CVE-2021-20668
- CVE-2021-20669
- CVE-2021-20670
- CVE-2021-20671
- CVE-2021-20829
|
- JVN : JVNVU#94889258
- National Vulnerability Database (NVD) : CVE-2021-20667
- National Vulnerability Database (NVD) : CVE-2021-20668
- National Vulnerability Database (NVD) : CVE-2021-20669
- National Vulnerability Database (NVD) : CVE-2021-20670
- National Vulnerability Database (NVD) : CVE-2021-20671
- National Vulnerability Database (NVD) : CVE-2021-20829
|
- [2021/03/09]
Web page was published
- [2021/09/22]
Overview was modified
CVSS Severity was modified
Affected Products : Product version was modified
Impact was modified
Solution was modified
References : Contents were added
- [2021/09/24]
Impact was modified
|