JVN#31723154
LacoodaST from SpaceTag, Inc. session fixation vulnerability
Overview
LacoodaST from SpaceTag, Inc. contains a session fixation vulnerability.
Products Affected
- LacoodaST 2.1.3 and earlier
Description
LacoodaST from SpaceTag, Inc. is groupware providing schedule and task managements, etc. LacoodaST contains a session fixation vulnerability.
Impact
A remote attacker impersonating a logged in user could manipulate the operation with the user's privilege. As a result, disclosure or alteration of information may occur.
Solution
Update the Software
Apply the latest update provided by the vendor.
For more information, refer to the vendor's website.
Vendor Status
Vendor | Link |
SpaceTag, Inc. |
About multiple vulnerabilities in LacoodaST |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2008.08.21
Measures | Conditions | Severity |
---|---|---|
Access Required | Routed - can be attacked over the Internet using packets |
|
Authentication | None - anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file |
|
Exploit Complexity | Low-Medium - some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Hirotaka Katagiri reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2008-3738 |
JVN iPedia |
JVNDB-2008-000047 |