[Japanese]
|
JVNDB-2022-000043
|
SHIRASAGI vulnerable to cross-site scripting
|
SHIRASAGI provided by SHIRASAGI Project contains a cross-site scripting vulnerability (CWE-79).
hibiki moriyama of STNet, Incorporated reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 6.1 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
CVSS V2 Severity: Base Metrics 4.3 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Medium
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
|
|
SHIRASAGI Project
- SHIRASAGI v1.0.0 to v1.14.2
- SHIRASAGI v1.15.0
|
|
An arbitrary script may be executed on the web browser of the user who is using the product.
|
[Update the Software]
Update to the latest version according to the information provided by the developer.
The developer has released the versions listed below that address the vulnerabilities.
* SHIRASAGI v1.14.3 (for v1.14.2 or earlier)
* SHIRASAGI v1.16.0 (for v1.15.0)
|
SHIRASAGI Project
|
- Cross-site Scripting(CWE-79) [IPA Evaluation]
|
- CVE-2022-29485
|
- JVN : JVN#32962443
- National Vulnerability Database (NVD) : CVE-2022-29485
|
- [2022/06/09]
Web page was published
- [2024/06/18]
References : Content was added
|