Published:2018/08/06 Last Updated:2018/08/31
JVN#62121133
Multiple directory traversal vulnerabilities in AttacheCase
Overview
AttacheCase contains multiple directory traversal vulnerabilities.
Products Affected
- AttacheCase ver.2.8.4.0 and earlier
- AttacheCase ver.3.3.0.0 and earlier
This advisory was first published on August 6, 2018. At that point it was stated that the affected products were "AttacheCase ver.2.8.3.0 and earlier" and "AttacheCase ver.3.2.3.0 and earlier".
However, later on it was found that the updated versions "AttacheCase ver.2.8.4.0" and "AttacheCase ver.3.3.0.0" contained insufficient fixes.
Therefore, information under [Products Affected] was modified as of as of August 31, 2018.
Description
AttacheCase is an open source file encryption software provided by HiBARA Software. AttacheCase contains a directory traversal vulnerability (CWE-22) due to a flaw in processing filenames in ATC files.
Impact
- Decrypting a crafted ATC file may result in creation of an arbitrary file or overwriting of an existing file - CVE-2018-0659
- Decrypting a crafted ATC file may result in creation of an arbitrary file - CVE-2018-0660
Solution
Update the Software
Update to the latest version according to the information provided by the developer.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
HiBARA Software | Vulnerable | 2018/08/06 | HiBARA Software website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Base Score:
3.3
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
CVSS v2
AV:N/AC:M/Au:N/C:N/I:P/A:N
Base Score:
4.3
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported CVE-2018-0660 vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2018-0659 |
CVE-2018-0660 |
|
JVN iPedia |
JVNDB-2018-000090 |
Update History
- 2018/08/31
- Information under [Products Affected] was modified.