2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2017-2255" ,
"sourceIdentifier" : "vultures@jpcert.or.jp" ,
"published" : "2017-08-29T01:35:13.627" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T03:23:09.973" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cross-site scripting vulnerability in Cybozu Garoon 3.7.0 to 4.2.5 allows an attacker to inject arbitrary web script or HTML via \"Rich text\" function of the application \"Space\"."
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiples vulnerabilidades de ruta de b\u00fasqueda no confiable en el instalador en Synology Cloud Station Backup anterior a la versi\u00f3n 4.2.5-4396 en Windows, permiten a los atacantes locales ejecutar c\u00f3digo arbitrario y conducir ataques de secuestro de DLL mediante un archivo de tipo caballo de Troya en las bibliotecas (1) shfolder.dll, (2) ntmarta.dll , (3) secur32.dll o (4) dwmapi.dll, en el directorio de trabajo actual."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.4 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.3 ,
"impactScore" : 2.7
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 3.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 6.8 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:3.7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B681C16-60F7-46B5-BD26-25F7DC9F5F47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:3.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "19694FDB-184D-4C09-BD72-BB7B96F6391D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:3.7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "595FBCBB-BC3F-4E18-AFBE-C95108C4CB2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:3.7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD33E00A-5082-42F4-81F5-4647BD602D31"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:3.7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B130F88-71DE-4FBF-B5DF-DD8173F03151"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:3.7.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F9B321F-6CDC-426B-AE62-090E067F3533"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:4.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "42A63B4B-0248-46B0-B0FB-7DBDD48DAA80"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:4.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4C3A49A-0C9C-4E43-B99C-2C28A12A8A09"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:4.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3A428CA3-8FAF-4DEB-8D95-5E76098E83B6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:4.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A9EABAA-964A-4242-939A-378B03A1F150"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:4.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9487784-3EF9-4B11-A831-5F3D35BC716E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:4.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B03D1A99-E1D3-4400-856C-62F2961E41FE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:4.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4165B99C-EE50-4151-90AF-CE1F71E86D2A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:4.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F6C3FA5-801C-440F-A755-6BC9BB04EB4F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cybozu:garoon:4.2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4F71558-BFBC-4D43-AAF8-7DEB7AE2F29D"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://jvn.jp/en/jp/JVN63564682/index.html" ,
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://support.cybozu.com/ja-jp/article/9746" ,
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://jvn.jp/en/jp/JVN63564682/index.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://support.cybozu.com/ja-jp/article/9746" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}