Server-side request forgery (SSRF) vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote authenticated attacker to conduct a port scan from the product and/or obtain information from the internal Web server.
References
Link | Resource |
---|---|
https://groupsession.jp/info/info-news/security202107 | Vendor Advisory |
https://jvn.jp/en/jp/JVN86026700/index.html | Third Party Advisory |
https://groupsession.jp/info/info-news/security202107 | Vendor Advisory |
https://jvn.jp/en/jp/JVN86026700/index.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://groupsession.jp/info/info-news/security202107 - Vendor Advisory | |
References | () https://jvn.jp/en/jp/JVN86026700/index.html - Third Party Advisory |
Information
Published : 2021-07-30 14:15
Updated : 2024-11-21 05:47
NVD link : CVE-2021-20788
Mitre link : CVE-2021-20788
CVE.ORG link : CVE-2021-20788
JSON object : View
Products Affected
groupsession
- groupsession
- groupsession_bycloud
- groupsession_zion
CWE
CWE-918
Server-Side Request Forgery (SSRF)