| 
[Japanese]
 | 
JVNDB-2022-000076
 | 
Growi vulnerable to improper access control
 | 
 
GROWI provided by WESEEK, Inc. contains an improper access control vulnerability (CWE-284). 
 
Kenta Yamamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. 
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 
 | 
 
  CVSS V3 Severity: Base Metrics 4.3 (Medium) [IPA Score]
  
    - Attack Vector: Network
 
    - Attack Complexity: Low
 
    - Privileges Required: Low
 
    - User Interaction: None
 
    - Scope: Unchanged
 
    - Confidentiality Impact: Low
 
    - Integrity Impact: None
 
    - Availability Impact: None
 
   
 
  CVSS V2 Severity: Base Metrics 4.0 (Medium) [IPA Score]
  
    - Access Vector: Network
 
    - Access Complexity: Low
 
    - Authentication: Single Instance
 
    - Confidentiality Impact: Partial
 
    - Integrity Impact: None
 
    - Availability Impact: None
 
   
 
 
  
 
 
 | 
 
	
 
 | 
 
	WESEEK, Inc.
	
		- GROWI versions prior to v5.1.4 (v5 series)
 
		- GROWI versions prior to v4.5.25 (v4 series)
 
		 
 
 | 
 
	
 
 | 
 
A user who can login to the affected product may download the markdown data from the pages set to private by the other users.
 
 | 
 
[Update the software] 
Update the software to the following versions according to the information provided by the developer. 
 
  * GROWI v5.1.4 or later (v5 series) 
  * GROWI v4.5.25 or later (v4 series)
 
 | 
 
	WESEEK, Inc.
	
 
 | 
 
	- Permissions(CWE-264) [IPA Evaluation]
 
 
 
 | 
 
	- CVE-2022-41799 
 
 
 
 | 
 
	- JVN : JVN#00845253 
 
	- National Vulnerability Database (NVD) : CVE-2022-41799 
 
 
 
 | 
 
	- [2022/10/07]
 
  Web page was published 
	- [2022/10/14]
 
  Vendor Information : Contents were added 
	- [2024/06/12]
 
  References : Content was added 
 
  
 
 |