JVN#86026700
Multiple vulnerabilities in GroupSession
Overview
GroupSession provided by Japan Total System Co.,Ltd. contains multiple vulnerabilities.
Products Affected
- GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0
- GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0
- GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0
Description
GroupSession provided by Japan Total System Co.,Ltd. contains multiple vulnerabilities listed below.
- Cross-site scripting vulnerability (CWE-79) - CVE-2021-20785
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Base Score: 6.1 CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6 - Cross-site request forgery (CWE-352) - CVE-2021-20786
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Base Score: 4.3 CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6 - Cross-site scripting vulnerability (CWE-79) - CVE-2021-20787
-
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Base Score: 6.1 CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6 - Sever-side request forgery (CWE-918) - CVE-2021-20788
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Base Score: 5.0 CVSS v2 AV:N/AC:L/Au:S/C:P/I:N/A:N Base Score: 4.0 - Open redirect (CWE-601) - CVE-2021-20789
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N Base Score: 4.7 CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6
Impact
- If a user sends a specially crafted request to a specific URL while logged in to the product with an administrative account, an arbitrary script may be executed - CVE-2021-20785, CVE-2021-20787
- If a user accesses a specially crafted URL while logged in to the product with an administrative account, the product's settings may be changed unintentionally - CVE-2021-20786
- A user who can access the bookmark function of the software may conduct a port scan from the product and/or obtain information from the internal Web server - CVE-2021-20788
- When accessing a specially crafted URL, the user may be redirected to an arbitrary website. As a result, the user may become a victim of a phishing attack - CVE-2021-20789
Solution
Update the software
Update the software to the latest version according to the information provided by the developer.
The developer has released the fixed version ver5.1.0.
Vendor Status
| Vendor | Status | Last Update | Vendor Notes |
|---|---|---|---|
| Japan Total System Co.,Ltd. | Vulnerable | 2021/07/19 | Japan Total System Co.,Ltd. website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
CVE-2021-20785, CVE-2021-20786
ASAI Ken reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2021-20787, CVE-2021-20788, CVE-2021-20789
Ryo Sato of BroadBand Security,Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert |
|
| JPCERT Reports |
|
| CERT Advisory |
|
| CPNI Advisory |
|
| TRnotes |
|
| CVE |
CVE-2021-20785 |
|
CVE-2021-20786 |
|
|
CVE-2021-20787 |
|
|
CVE-2021-20788 |
|
|
CVE-2021-20789 |
|
| JVN iPedia |
JVNDB-2021-000070 |
Update History
- 2021/07/19
- Fixed some errors in the section under [Description].
- 2023/03/08
- Information under the section [Credit] was updated.