[Japanese]
|
JVNDB-2022-000076
|
Growi vulnerable to improper access control
|
GROWI provided by WESEEK, Inc. contains an improper access control vulnerability (CWE-284).
Kenta Yamamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 4.3 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
CVSS V2 Severity: Base Metrics 4.0 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: Single Instance
- Confidentiality Impact: Partial
- Integrity Impact: None
- Availability Impact: None
|
|
WESEEK, Inc.
- GROWI versions prior to v5.1.4 (v5 series)
- GROWI versions prior to v4.5.25 (v4 series)
|
|
A user who can login to the affected product may download the markdown data from the pages set to private by the other users.
|
[Update the software]
Update the software to the following versions according to the information provided by the developer.
* GROWI v5.1.4 or later (v5 series)
* GROWI v4.5.25 or later (v4 series)
|
WESEEK, Inc.
|
- Permissions(CWE-264) [IPA Evaluation]
|
- CVE-2022-41799
|
- JVN : JVN#00845253
- National Vulnerability Database (NVD) : CVE-2022-41799
|
- [2022/10/07]
Web page was published
- [2022/10/14]
Vendor Information : Contents were added
- [2024/06/12]
References : Content was added
|