CVE-2021-20788

Server-side request forgery (SSRF) vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote authenticated attacker to conduct a port scan from the product and/or obtain information from the internal Web server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:groupsession:groupsession:*:*:*:*:free:*:*:*
cpe:2.3:a:groupsession:groupsession_bycloud:*:*:*:*:*:*:*:*
cpe:2.3:a:groupsession:groupsession_zion:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:47

Type Values Removed Values Added
References () https://groupsession.jp/info/info-news/security202107 - Vendor Advisory () https://groupsession.jp/info/info-news/security202107 - Vendor Advisory
References () https://jvn.jp/en/jp/JVN86026700/index.html - Third Party Advisory () https://jvn.jp/en/jp/JVN86026700/index.html - Third Party Advisory

Information

Published : 2021-07-30 14:15

Updated : 2024-11-21 05:47


NVD link : CVE-2021-20788

Mitre link : CVE-2021-20788

CVE.ORG link : CVE-2021-20788


JSON object : View

Products Affected

groupsession

  • groupsession
  • groupsession_bycloud
  • groupsession_zion
CWE
CWE-918

Server-Side Request Forgery (SSRF)