JVN#83428818
La!cooda WIZ and LacoodaST vulnerable to cross-site request forgery
Overview
La!cooda WIZ and LacoodaST contain a cross-site request forgery vulnerability.
Products Affected
- La!cooda WIZ 1.4.0 and earlier
- LacoodaST 2.1.3 and earlier
Description
La!cooda WIZ from System Consultants Co., Ltd. and LacoodaST from SpaceTag, Inc. are groupware providing schedule and task managements, etc. La!cooda WIZ and LacoodaST contain a cross-site request forgery vulnerability.
Impact
Password or other configurations may be changed if the logged in user views a malicious web page.
Solution
Update the Software
Apply the latest updates provided by the vendors.
For more information, refer to the vendors' websites.
Vendor Status
Vendor | Link |
System Consultants Co., Ltd. |
About multiple vulnerabilities in La!cooda WIZ |
SpaceTag, Inc. |
About multiple vulnerabilities in LacoodaST |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2008.08.21
Measures | Conditions | Severity |
---|---|---|
Access Required | Routed - can be attacked over the Internet using packets |
|
Authentication | None - anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file |
|
Exploit Complexity | Low - little to no expertise and/or luck required to exploit (cross-site scripting) |
|
Credit
Hirotaka Katagiri reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2008-3736 |
JVN iPedia |
JVNDB-2008-000046 |