SB2021080202 - Multiple vulnerabilities in Cybozu Garoon
Published: August 2, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 18 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2021-20753)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Scheduler. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Cross-site scripting (CVE-ID: CVE-2021-20766)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Message. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Cross-site scripting (CVE-ID: CVE-2021-20770)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Message. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Cross-site scripting (CVE-ID: CVE-2021-20769)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Bulletin. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
5) Input validation error (CVE-ID: CVE-2021-20768)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in Scheduler and MultiReport. A remote authenticated attacker can pass specially crafted input to the application and delete the data of Scheduler and MultiReport without the appropriate privilege
6) Cross-site scripting (CVE-ID: CVE-2021-20767)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Full Text Search. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
7) Cross-site scripting (CVE-ID: CVE-2021-20765)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Bulletin. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
8) Input validation error (CVE-ID: CVE-2021-20754)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in Workflow. A remote authenticated attacker can pass specially crafted input to the application and alter the data of Workflow without the appropriate privilege.
9) Input validation error (CVE-ID: CVE-2021-20764)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in Attaching Files. A remote attacker can pass specially crafted input to the application and obtain the data of Attaching Files.
10) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-20763)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to application does not properly impose security restrictions in Portal. A remote authenticated attacker can alter the data of Portal without the appropriate privilege.
11) Input validation error (CVE-ID: CVE-2021-20762)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in E-mail. A remote authenticated attacker can pass specially crafted input to the application and alter the data of E-mail without the appropriate privilege.
12) Input validation error (CVE-ID: CVE-2021-20761)
The vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in in E-mail. A remote administrator can pass specially crafted input to the application and alter the data of E-mail without the appropriate privilege.
13) Input validation error (CVE-ID: CVE-2021-20760)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in User Profile. A remote authenticated attacker can pass specially crafted input to the application and alter the data of User Profile without the appropriate privilege.
14) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-20759)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to application does not properly impose security restrictions in Bulletin. A remote authenticated attacker can perform unintended operations.
15) Cross-site request forgery (CVE-ID: CVE-2021-20758)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin in Message. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
16) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-20757)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to application does not properly impose security restrictions in E-mail. A remote authenticated attacker can alter the data of E-mail without the appropriate privilege.
17) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-20756)
The vulnerability allows a remote attacker to gain access to sensitive information on the system.
The vulnerability exists due to application does not properly impose security restrictions in Address. A remote authenticated attacker can obtain the data of Address without the viewing privilege.
18) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-20755)
The vulnerability allows a remote attacker to gain access to sensitive information on the system.
The vulnerability exists due to application does not properly impose security restrictions in Portal. A remote authenticated attacker can obtain the data of Portal without the viewing privilege.
Remediation
Install update from vendor's website.