Published:2019/02/05  Last Updated:2019/02/05

JVN#63860183
POWER EGG vulnerability where EL expression may be executed

Overview

POWER EGG contains a vulnerability where an arbitrary EL expression may be executed.

Products Affected

  • POWER EGG 2.0 Ver 2.0.1
  • POWER EGG 2.0 Ver 2.02 Patch 3 and earlier
  • POWER EGG 2.0 Ver 2.1 Patch 4 and earlier
  • POWER EGG 2.0 Ver 2.2 Patch 7 and earlier
  • POWER EGG 2.0 Ver 2.3 Patch 9 and earlier
  • POWER EGG 2.0 Ver 2.4 Patch 13 and earlier
  • POWER EGG 2.0 Ver 2.5 Patch 12 and earlier
  • POWER EGG 2.0 Ver 2.6 Patch 8 and earlier
  • POWER EGG 2.0 Ver 2.7 Patch 6 and earlier
  • POWER EGG 2.0 Ver 2.7 Government Edition Patch 7 and earlier
  • POWER EGG 2.0 Ver 2.8 Patch 6 and earlier
  • POWER EGG 2.0 Ver 2.8c Patch 5 and earlier
  • POWER EGG 2.0 Ver 2.9 Patch 4 and earlier
POWER EGG 2.0 Ver2.10c, POWER EGG 2.0 Ver2.11c, and POWER EGG 3.0 are not affected by this vulnerability.

Description

POWER EGG provided by D-CIRCLE inc. is an integrated collaboration tool. POWER EGG contains a vulnerability where an arbitray EL expression may be executed (CWE-20).

Impact

A remote attacker may execute an arbitrary EL expression from the server where the product is running. As a result, an arbitrary command may be executed.

Solution

Update the Software
Update to the latest version of software according to the information provided by the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
D-CIRCLE inc. Vulnerable 2019/02/05 D-CIRCLE inc. website

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Base Score: 7.3
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score: 7.5
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Touma Hatano reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2019-5916
JVN iPedia JVNDB-2019-000006