JVN#05579230
Multiple Alps System Integration products and the OEM products vulnerable to cross-site request forgery
Overview
Multiple Alps System Integration products and the OEM products contain a cross-site request forgery vulnerability.
Products Affected
Alps System Integration Co., Ltd.
- InterSafe WebFilter
- InterSafe LogDirector
- InterSafe GatewayConnection
- InterSafe LogNavigator
- InterSafe CATS
- InterSafe MobileSecurity
Trend Micro Incorporated
- InterScan WebManager
- MJS WebFiltering
- AssetView F
- LANSCOPE EndpointManager WebFiltering
- SPPM BizBrowser
- SPPM Secure Filtering
- URL Filtering
- KAITO SecureBrowser
Description
Multiple Alps System Integration products and the OEM products contain a cross-site request forgery vulnerability (CWE-352).
Impact
If a user views a malicious page while logged in, unintended operations may be performed.
Solution
Update the software or apply the workaround
Update the software to the latest version or apply the workaround according to the information provided by the developer.
Note that the vulnerability in the following products was addressed. Therefore, no action is required from the users.
Alps System Integration Co., Ltd.
- InterSafe GatewayConnection (Measures completion date: July 20, 2024)
- InterSafe CATS (Measures completion date: July 4, 2024)
- InterSafe MobileSecurity (Measures completion date: August 31, 2024)
- MJS WebFiltering (Measures completion date: July 4, 2024)
- AssetView F (Measures completion date: July 4, 2024)
- LANSCOPE EndpointManager WebFiltering (Measures completion date: July 4, 2024)
- SPPM BizBrowser (Measures completion date: June 18, 2024)
- SPPM Secure Filtering (Measures completion date: July 20, 2024)
- URL Filtering (Measures completion date: July 4, 2024)
- KAITO SecureBrowser (Measures completion date: July 4, 2024)
Vendor Status
Vendor | Link |
Alps System Integration Co., Ltd. | Multiple InterSafe products contain a cross-site request forgery vulnerability (Text in Japanese) |
Trend Micro Incorporated | Alert/Advisory: Vulnerability of Cross-Site Request Forgery (CSRF) in InterScan WebManager (Text in Japanese) |
MOTEX Inc. | [For Web Filtering users]Cross-Site Request Forgery Vulnerability (Text in Japanese) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Credit
Yoshiaki komeyama of KOBELCO SYSTEMS CORPORATION reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2024-45504 |
JVN iPedia |
JVNDB-2024-000095 |
Update History
- 2024/09/10
- Information under the section [Vendor Status] was updated.