| [Japanese] | 
| JVNDB-2024-000039 | 
| Multiple vulnerabilities in a-blog cms | 
|
| 
 
a-blog cms provided by appleple inc. contains multiple vulnerabilities listed below.
 * Stored cross-site scripting vulnerability in Entry editing pages (CWE-79) - CVE-2024-30419
 * Server-side request forgery (CWE-918) - CVE-2024-30420
 * Directory traversal (CWE-22) - CVE-2024-31394
 * Stored cross-site scripting vulnerability in Schedule labeling pages (CWE-79) - CVE-2024-31395
 * Code injection (CWE-94) - CVE-2024-31396
 
 Rikuto Tauchi of sangi reported these vulnerabilities to IPA.
 JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 | 
|
| 
 
  CVSS V3 Severity:Base Metrics 6.6 (Medium) [IPA Score]
 
    Attack Vector: NetworkAttack Complexity: HighPrivileges Required: HighUser Interaction: NoneScope: UnchangedConfidentiality Impact: HighIntegrity Impact: HighAvailability Impact: High 
  
The above CVSS base scores have been assigned for CVE-2024-31396
 | 
| 
 
  CVSS V3 Severity:Base Metrics
5.4 (Medium) [IPA Score]
 
Attack Vector: Network
Attack Complexity: Low
Privileges Required: Low
User Interaction: Required
Scope: Changed
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2024-30419
 | 
| 
 
  CVSS V3 Severity:Base Metrics
4.4 (Medium) [IPA Score]
 
Attack Vector: Network
Attack Complexity: High
Privileges Required: High
User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2024-30420
 | 
| 
 
  CVSS V3 Severity:Base Metrics
6.5 (Medium) [IPA Score]
 
Attack Vector: Network
Attack Complexity: Low
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: None
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2024-31394
 | 
| 
 
  CVSS V3 Severity:Base Metrics
5.4 (Medium) [IPA Score]
 
Attack Vector: Network
Attack Complexity: Low
Privileges Required: Low
User Interaction: Required
Scope: Changed
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2024-31395
 | 
|
| 
 
	
 | 
| 
 
	appleple inc.
	
		a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 (CVE-2024-30419, CVE-2024-31394, CVE-2024-31395)a-blog cms Ver.3.0.x series versions prior to Ver.3.0.32 (CVE-2024-30419, CVE-2024-31394, CVE-2024-31395)a-blog cms Ver.2.11.x series versions prior to Ver.2.11.61 (CVE-2024-30419, CVE-2024-31394, CVE-2024-31395)a-blog cms Ver.2.10.x series versions prior to Ver.2.10.53 (CVE-2024-30419, CVE-2024-31394, CVE-2024-31395)a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 (CVE-2024-30420, CVE-2024-31396)a-blog cms Ver.3.0.x series versions prior to Ver.3.0.32 (CVE-2024-30420, CVE-2024-31396) | 
| 
 
	CVE-2024-30419, CVE-2024-31394, CVE-2024-31395According to the developer, a-blog cms Ver.2.9 and earlier versions, which are now unsupported, are affected by the vulnerabilities as well.
 | 
|
| 
 
  * A user with a contributor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the website using the product (CVE-2024-30419)* A user with an administrator or higher privilege who can log in to the product may obtain arbitrary files on the server and information on the internal server that is not disclosed to the public (CVE-2024-30420)
 * A user with an editor or higher privilege who can log in to the product may obtain arbitrary files on the server (CVE-2024-31394)
 * A user with an editor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the schedule management page (CVE-2024-31395)
 * A user with an administrator or higher privilege who can log in to the product may execute an arbitrary command on the server (CVE-2024-31396)
 | 
|
| 
 
[Update the Software]Update the software to the latest version according to the information provided by the developer.
 
 [Apply the workaround]
 For CVE-2024-30420, CVE-2024-31394, CVE-2024-31395, and CVE-2024-31396 vulnerabilities, the developer also recommends applying workarounds to mitigate the impacts of these vulnerabilities.
 
 For more information, refer to the information provided by the developer.
 | 
|
| 
 
	appleple inc.
	
 | 
|
| 
 
	Path Traversal(CWE-22) [IPA Evaluation]Cross-site Scripting(CWE-79) [IPA Evaluation]Code Injection(CWE-94) [IPA Evaluation]No Mapping(CWE-Other) [IPA Evaluation] | 
|
| 
 
	CVE-2024-30419 CVE-2024-30420 CVE-2024-31394 CVE-2024-31395 CVE-2024-31396  | 
|
| 
 
	JVN : JVN#70977403  | 
|
| 
 
	[2024/04/10]Web page was published
 
 |