Published:2020/11/17  Last Updated:2020/11/17

JVNVU#99880454
Multiple vulnerabilities in KonaWiki3

Overview

KonaWiki3 contains multiple vulnerabilities.

Products Affected

  • KonaWiki3.1.1 and earlier

Description

KonaWiki3 is a lightweight wiki clone that supports Japanese wiki notation. KonaWiki3 contains multiple vulnerabilities listed below.

  • Path Traversal (CWE-22) - CVE-2020-5670
    CVSS v3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Base Score: 4.7
  • Path Traversal (CWE-22) - CVE-2020-5671
    CVSS v3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N Base Score: 6.1
  • Stored Cross-site Scripting (CWE-79) - CVE-2020-5672
    CVSS v3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Base Score: 5.4
  • Reflected Cross-site Scripting (CWE-79) - CVE-2020-5673
    CVSS v3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Base Score: 5.4

Impact

  • Inadequate query checking allows unauthorized disclosure of information stored above the target directory published as a website by a remote attacker. The exploit of this vulnerability is limited to the files with specific extension only. - CVE-2020-5670
  • Inadequate query checking allows unauthorized disclosure of information stored above the target directory published as a website by a remote attacker. By exploiting this vulnerability, arbitrary files can be obtained. - CVE-2020-5671
  • Because the sanitizing process is not performed properly, an arbitrary script is executed on the web browser of the user who accesses a wiki page containing a specially crafted content written by an attacker. - CVE-2020-5672
  • Because the sanitizing process is not performed properly, an arbitrary script is executed on the web browser of the user who accesses a specially crafted URL. - CVE-2020-5673

Solution

Update the software
Update the software to the latest version according to the information provided by the developer.

  • KonaWiki3.1.2

Vendor Status

Vendor Link
kujirahand KonaWiki

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

stypr of Flatt Security Inc. reported this vulnerability to the developer and coordinated on his own.
After coordination was completed, this case was reported to JPCERT/CC, and JPCERT/CC coordinated with the developer for the publication.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2020-5670
CVE-2020-5671
CVE-2020-5672
CVE-2020-5673
JVN iPedia