Published:2020/11/17 Last Updated:2020/11/17
JVNVU#99880454
Multiple vulnerabilities in KonaWiki3
Overview
KonaWiki3 contains multiple vulnerabilities.
Products Affected
- KonaWiki3.1.1 and earlier
Description
KonaWiki3 is a lightweight wiki clone that supports Japanese wiki notation. KonaWiki3 contains multiple vulnerabilities listed below.
- Path Traversal (CWE-22) - CVE-2020-5670
CVSS v3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Base Score: 4.7 - Path Traversal (CWE-22) - CVE-2020-5671
CVSS v3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N Base Score: 6.1 - Stored Cross-site Scripting (CWE-79) - CVE-2020-5672
CVSS v3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Base Score: 5.4 - Reflected Cross-site Scripting (CWE-79) - CVE-2020-5673
CVSS v3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Base Score: 5.4
Impact
- Inadequate query checking allows unauthorized disclosure of information stored above the target directory published as a website by a remote attacker. The exploit of this vulnerability is limited to the files with specific extension only. - CVE-2020-5670
- Inadequate query checking allows unauthorized disclosure of information stored above the target directory published as a website by a remote attacker. By exploiting this vulnerability, arbitrary files can be obtained. - CVE-2020-5671
- Because the sanitizing process is not performed properly, an arbitrary script is executed on the web browser of the user who accesses a wiki page containing a specially crafted content written by an attacker. - CVE-2020-5672
- Because the sanitizing process is not performed properly, an arbitrary script is executed on the web browser of the user who accesses a specially crafted URL. - CVE-2020-5673
Solution
Update the software
Update the software to the latest version according to the information provided by the developer.
- KonaWiki3.1.2
Vendor Status
Vendor | Link |
kujirahand | KonaWiki |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
stypr of Flatt Security Inc. reported this vulnerability to the developer and coordinated on his own.
After coordination was completed, this case was reported to JPCERT/CC, and JPCERT/CC coordinated with the developer for the publication.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2020-5670 |
CVE-2020-5671 |
|
CVE-2020-5672 |
|
CVE-2020-5673 |
|
JVN iPedia |
|