Published:2014/02/26  Last Updated:2014/02/26
      
        JVN#26393529
        Cybozu Garoon vulnerable to directory traversal
              
      
      Overview
Cybozu Garoon contains a directory traversal vulnerability.
Products Affected
- Cybozu Garoon 2.5.4 and earlier
- Cybozu Garoon 3.7 Service Pack 3 and earlier
Description
Cybozu Garoon provided by Cybozu, Inc. is a groupware. Cybozu Garoon 
contains a directory traversal vulnerability in the process of 
downloading files.
Impact
A user who can log in to the product may obtain files on the server.
Solution
For Cybozu Garoon 3.7:
Apply the Patch
Apply the appropriate patch according to the information provided by the developer.
For Cybozu Garoon 3.5 and earlier and Cybozu Garoon  2.5.4 and earlier:
Update the Software and apply the patch 
Update to the latest version, and then apply the appropriate patch according to the information provided by the developer.
Vendor Status
| Vendor | Status | Last Update | Vendor Notes | 
|---|---|---|---|
| Cybozu, Inc. | Vulnerable | 2014/02/26 | Cybozu, Inc. website | 
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2014.02.26
| Measures | Conditions | Severity | 
|---|---|---|
| Access Required | can be attacked over the Internet using packets | 
 | 
| Authentication | login caused to be created by an administrator | 
 | 
| User Interaction Required | the vulnerability can be exploited without an honest user taking any action | 
 | 
| Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) | 
 | 
Credit
Other Information
| JPCERT Alert | |
| JPCERT Reports | |
| CERT Advisory |  | 
| CPNI Advisory |  | 
| TRnotes |  | 
| CVE | CVE-2014-0820 | 
| JVN iPedia | JVNDB-2014-000023 | 

