CVE Vulnerabilities

CVE-2017-2094

Improper Privilege Management

Published: Apr 28, 2017 | Modified: Oct 03, 2019
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

Cybozu Garoon 3.0.0 to 4.2.3 allows remote authenticated attackers to bypass access restriction in Workflow and the MultiReport function to alter or delete information via unspecified vectors.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

Name Vendor Start Version End Version
Garoon Cybozu 3.0.0 (including) 3.0.0 (including)
Garoon Cybozu 3.0.1 (including) 3.0.1 (including)
Garoon Cybozu 3.0.2 (including) 3.0.2 (including)
Garoon Cybozu 3.0.3 (including) 3.0.3 (including)
Garoon Cybozu 3.1.0 (including) 3.1.0 (including)
Garoon Cybozu 3.1.1 (including) 3.1.1 (including)
Garoon Cybozu 3.1.2 (including) 3.1.2 (including)
Garoon Cybozu 3.1.3 (including) 3.1.3 (including)
Garoon Cybozu 3.5.0 (including) 3.5.0 (including)
Garoon Cybozu 3.5.1 (including) 3.5.1 (including)
Garoon Cybozu 3.5.2 (including) 3.5.2 (including)
Garoon Cybozu 3.5.3 (including) 3.5.3 (including)
Garoon Cybozu 3.5.4 (including) 3.5.4 (including)
Garoon Cybozu 3.5.5 (including) 3.5.5 (including)
Garoon Cybozu 3.7.0 (including) 3.7.0 (including)
Garoon Cybozu 3.7.1 (including) 3.7.1 (including)
Garoon Cybozu 3.7.2 (including) 3.7.2 (including)
Garoon Cybozu 3.7.3 (including) 3.7.3 (including)
Garoon Cybozu 3.7.4 (including) 3.7.4 (including)
Garoon Cybozu 3.7.5 (including) 3.7.5 (including)
Garoon Cybozu 4.0.0 (including) 4.0.0 (including)
Garoon Cybozu 4.0.1 (including) 4.0.1 (including)
Garoon Cybozu 4.0.2 (including) 4.0.2 (including)
Garoon Cybozu 4.0.3 (including) 4.0.3 (including)
Garoon Cybozu 4.2.0 (including) 4.2.0 (including)
Garoon Cybozu 4.2.1 (including) 4.2.1 (including)
Garoon Cybozu 4.2.2 (including) 4.2.2 (including)
Garoon Cybozu 4.2.3 (including) 4.2.3 (including)

Potential Mitigations

References