JVN#59576930
        Zero-channel BBS Plus vulnerable to cross-site scripting
              
      
      Overview
Zero-channel BBS Plus provided by Zero-Channel BBS Plus Developers contains a cross-site scripting vulnerability.
Products Affected
- Zero-channel BBS Plus v0.7.4 and earlier
 
Description
Zero-channel BBS Plus by Zero-Channel BBS Plus Developers is a bulletin board CGI script. Zero-channel BBS Plus contains a cross-site scripting vulnerability (CWE-79).
Impact
An arbitrary script may be executed on the web browser of the user who is accessing the management screen of the product, which may lead to the creation of a management account. As a result, a remote attacker may view the sender's information on the bulletin board, change the settings, edit/delete the posts.
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer.
Vendor Status
| Vendor | Link | 
| Zero-Channel BBS Plus Developers | zerochplus 0.7.5 (Text in Japanese) | 
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
| Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) | 
|---|---|---|---|---|
| Attack Complexity(AC) | High (H) | Low (L) | ||
| Privileges Required(PR) | High (H) | Low (L) | None (N) | |
| User Interaction(UI) | Required (R) | None (N) | ||
| Scope(S) | Unchanged (U) | Changed (C) | ||
| Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
| Integrity Impact(I) | None (N) | Low (L) | High (H) | |
| Availability Impact(A) | None (N) | Low (L) | High (H) | 
| Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) | 
|---|---|---|---|
| Access Complexity(AC) | High (H) | Medium (M) | Low (L) | 
| Authentication(Au) | Multiple (M) | Single (S) | None (N) | 
| Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) | 
| Integrity Impact(I) | None (N) | Partial (P) | Complete (C) | 
| Availability Impact(A) | None (N) | Partial (P) | Complete (C) | 
Credit
Zero-Channel BBS Plus Developers reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Zero-Channel BBS Plus Developers coordinated under the Information Security Early Warning Partnership.
Other Information
| JPCERT Alert | 
                                     | 
              
| JPCERT Reports | 
                                     | 
              
| CERT Advisory | 
                                     | 
              
| CPNI Advisory | 
                                     | 
              
| TRnotes | 
                                     | 
              
| CVE | 
                                    CVE-2022-27496 | 
              
| JVN iPedia | 
                                    JVNDB-2022-000024 |