Directory traversal vulnerability in the logging implementation in Cybozu Garoon 3.7 through 4.2 allows remote authenticated users to read a log file via unspecified vectors.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN14749391/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000095 | Vendor Advisory |
https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03 | Patch Vendor Advisory |
http://jvn.jp/en/jp/JVN14749391/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000095 | Vendor Advisory |
https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN14749391/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2016-000095 - Vendor Advisory | |
References | () https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03 - Patch, Vendor Advisory |
Information
Published : 2016-06-19 20:59
Updated : 2024-11-21 02:45
NVD link : CVE-2016-1192
Mitre link : CVE-2016-1192
CVE.ORG link : CVE-2016-1192
JSON object : View
Products Affected
cybozu
- garoon