JVN#35897618
GBrowse vulnerable to unrestricted upload of files with dangerous types
Critical
Overview
GBrowse is vulnerable to unrestricted upload of files with dangerous types.
Products Affected
- GBrowse
Description
GBrowse provided by Generic Model Organism Database Project is a web-based genome browser. GBrowse allows the users to upload their own data in several file formats (see "GBrowse User Uploads").
The affected versions of GBrowse accept files with any formats uploaded (CWE-434), and place them in the area accessible through unauthenticated web requests.
The reporter states that attacks exploiting this vulnerability have been observed.
Impact
Anyone who can upload files through the product may execute arbitrary code on the server.
Solution
Stop using the product and Switch to the successor
The developer states that GBrowse is no longer supported and recommends using the successor product JBrowse2.
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Comment
This analysis assumes that the product allows any unauthenticated users to upload files, hence PR:N, Au:N.
Credit
Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2023-32637 |
JVN iPedia |
JVNDB-2023-000073 |