Published:2016/06/07  Last Updated:2016/06/08

JVN#74659077
TERASOLUNA Server Framework for Java(WEB) access restriction bypass vulnerability in the file extention filter

Overview

The TERASOLUNA Server Framework for Java(WEB) has a function to restrict access to contents with specified file extentions from browser requests. This function may be bypassed when a specially crafted path is received.

Products Affected

  • TERASOLUNA Server Framework for Java(WEB) versions 2.0.0.1 through 2.0.6.1

Description

The TERASOLUNA Server Framework for Java(WEB) provided by NTT Data Corporation is a software framework for creating web applications. The TERASOLUNA Server Framework for Java(WEB) has a function to restrict access to contents with specified file extentions from browser requests. This function may be bypassed when a specially crafted path is received.

Impact

Effects vary depending on the web application. For example, a remote attacker may obtain information on the server where the product resides.

Solution

Apply the update module
The developer has released an update module (PI-SJW-261-1) for TERASOLUNA Server Framework for Java(WEB) versions 2.0.0.1 through 2.0.6.1.
Apply the update module according to the information provided by the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
Allied Telesis K.K. Not Vulnerable 2016/06/07
Cybozu, Inc. Not Vulnerable 2016/06/07
FUJITSU LIMITED Vulnerable 2016/06/07
Hitachi Not Vulnerable 2016/06/07
JT Engineering inc. Not Vulnerable 2016/06/07
NEC Corporation Not Vulnerable 2016/06/07
NTT DATA Corporation Vulnerable 2016/06/07 NTT DATA Corporation website
RICOH COMPANY, LTD. Not Vulnerable 2016/06/07

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score: 3.7
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:M/Au:N/C:P/I:N/A:N
Base Score: 4.3
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

NTT Data Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and NTT Data Corporation coordinated under the Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2016-1183
JVN iPedia JVNDB-2016-000098

Update History

2016/06/08
NEC Corporation update status