Published:2016/05/30  Last Updated:2016/05/30

JVN#13794955
Source code of Old_GSI_Maps prior to January, 2015 vulnerable to directory traversal

Overview

Source code of Old_GSI_Maps prior to January, 2015 contains a directory traversal vulnerability.

Products Affected

  • Old_GSI_Maps that was available through GitHub prior to May 25th, 2016

Description

kml2jsonp.php contained in source code of Old_GSI_Maps prior to January, 2015 provided by the Geospatial Information Authority of Japan (GSI) contains a directory traversal vulnerability (CWE-22).

Impact

When the product is used in Windows, a remote attacker may obtain arbitrary files from the server where the product is running.

Solution

Apply the update
Update kml2jsonp.php according to the information provided by the developer.

The developer recommends using "The source of GSI Maps", which is the source code of GSI_Maps currently being maintained by GSI.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Base Score: 5.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:L/Au:N/C:P/I:N/A:N
Base Score: 5.0
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Shoji Baba reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2016-4814
JVN iPedia JVNDB-2016-000090