Published:2008/07/23  Last Updated:2008/07/25

K's CGI Access Log Kaiseki ( vulnerable to cross-site scripting


analysis.cgi included in K's CGI Access Log Kaiseki ( contains a cross-site scripting vulnerability.

Products Affected

  • Access Log Kaiseki ( analysis.cgi Ver.1.44 and earlier
For more information, refer to the developer's website.


K's CGI Access Log Kaiseki is a program to analyze access to a web page. analysis.cgi included in Access Log Kaiseki ( contains a cross-site scripting vulnerability.


An arbitrary script could be executed on the user's web browser.


Update the Software
Apply the latest update provided by the developer.


JPCERT/CC Addendum

The developer has released the information "Important Note as of 2008 July 18" on the developer's homepage regarding this issue.

Vulnerability Analysis by JPCERT/CC

Analyzed on 2008.07.23

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Medium
Exploit Complexity Low - little to no expertise and/or luck required to exploit (cross-site scripting)
  • High

Description of each analysis measures


AzureStone of reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2008-4663
JVN iPedia JVNDB-2008-000044

Update History