[Japanese]

JVNDB-2023-000079

Multiple vulnerabilities in Special Interest Group Network for Analysis and Liaison's API

Overview

Special Interest Group Network for Analysis and Liaison's "Inter-SOC Cooperation API" provided by Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) contains multiple vulnerabilities listed below.

* Improper Authorization in Information Provision function (CWE-285) - CVE-2023-38751
* Improper Authorization in Information Provision and Group Message functions (CWE-285) - CVE-2023-38752

yusuke negishi of JPCERT/CC Platform Service Group reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 3.5 (Low) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: None
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 4.0 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication: Single Instance
  • Confidentiality Impact: Partial
  • Integrity Impact: None
  • Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-38751


CVSS V3 Severity:
Base Metrics 3.5 (Low) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: None
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 4.0 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication: Single
  • Confidentiality Impact: Partial
  • Integrity Impact: None
  • Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-38752
Affected Products


JPCERT Coordination Center
  • Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7

Impact

* Organization information of the information receiver that is set as "non-disclosure" in the information provision operation may be viewed by an authorized API user - CVE-2023-38751
* Attribute information of the poster that is set as "non-disclosure" in the system settings may be viewed by an authorized API user - CVE-2023-38752
Solution

[Apply the Patch]
Apply the patch according to the information provided by the developer.
For more information, contact the developer.

[Apply the workaround]
If the patch cannot be applied, applying the following workaround may mitigate the impacts of these vulnerabilities.

* Configure to stop using the API
Vendor Information

JPCERT Coordination Center
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2023-38751
  2. CVE-2023-38752
References

  1. JVN : JVN#83334799
  2. National Vulnerability Database (NVD) : CVE-2023-38751
  3. National Vulnerability Database (NVD) : CVE-2023-38752
Revision History

  • [2023/08/07]
      Web page was published
  • [2024/03/28]
      References : Contents were added