SB2022051607 - Multiple vulnerabilities in Cybozu Garoon
Published: May 16, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 13 secuirty vulnerabilities.
1) Improper Authorization (CVE-ID: CVE-2022-26368)
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to browse restriction bypass and operation restriction bypass issue in Cabinet. A remote user can alter and/or obtain the data of Cabinet.
2) Improper Authentication (CVE-ID: CVE-2022-28713)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests in Scheduler. A remote attacker can bypass authentication process and obtain some data of Facility Information.
3) Information disclosure (CVE-ID: CVE-2022-29467)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote user can obtain some data of Address.
4) Input validation error (CVE-ID: CVE-2022-27807)
The vulnerability allows a remote attacker to compromise the system.
The vulnerability exists due to insufficient validation of user-supplied input in Link. A remote user can pass specially crafted input to the application and make it impossible to add Categories.
5) Improper Authorization (CVE-ID: CVE-2022-26054)
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to operation restriction bypass in Link. A remote user can alter the data of Link.
6) Cross-site scripting (CVE-ID: CVE-2022-27627)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Organization's Information. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
7) Input validation error (CVE-ID: CVE-2022-27803)
The vulnerability allows a remote attacker to compromise the system.
The vulnerability exists due to insufficient validation of user-supplied input in Space. A remote user can pass specially crafted input to the application and alter the data of Space.
8) Improper Authorization (CVE-ID: CVE-2022-28718)
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to operation restriction bypass in Bulletin. A remote user can alter the data of Bulletin.
9) Input validation error (CVE-ID: CVE-2022-28692)
The vulnerability allows a remote attacker to compromise the system.
The vulnerability exists due to insufficient validation of user-supplied input in Scheduler. A remote user can pass specially crafted input to the application and alter the data of Scheduler.
10) Improper Authorization (CVE-ID: CVE-2022-26051)
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to operation restriction bypass in Portal. A remote user can alter the data of Portal.
11) Cross-site scripting (CVE-ID: CVE-2022-29513)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Scheduler. A remote user can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
12) Input validation error (CVE-ID: CVE-2022-29892)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Space. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
13) Improper Authorization (CVE-ID: CVE-2022-27661)
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to operation restriction bypass in Workflow. A remote user can alter the data of Workflow.
Remediation
Install update from vendor's website.