Some vulnerabilities have been reported in Cybozu Garoon, which can be exploited by malicious people to conduct session fixation and script insertion attacks.
1) An error in the handling of sessions can be exploited to hijack a user's session by tricking the user into logging in after following a specially crafted link.
2) Input passed via RSS feeds is not properly sanitised before being returned to a user. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when a user is e.g. tricked into subscribing to a malicious RSS feed.
The vulnerabilities reportedly affect versions 2.0.0 to 2.1.3.
Solution: Update to the latest version (see vendor's advisories for details).
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Cybozu Garoon Session Fixation and Script Insertion
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.