All the vulnerabilites related to Japan Total System Co.,Ltd. - GroupSession Free edition, GroupSession byCloud, GroupSession ZION
cve-2021-20874
Vulnerability from cvelistv5
Published
2021-12-24 06:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Incorrect permission assignment for critical resource vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to access arbitrary files on the server and obtain sensitive information via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://groupsession.jp/info/info-news/security20211220 | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN79798166/index.html | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:23.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groupsession.jp/info/info-news/security20211220" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN79798166/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GroupSession Free edition, GroupSession byCloud, GroupSession ZION", "vendor": "Japan Total System Co.,Ltd.", "versions": [ { "status": "affected", "version": "GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect permission assignment for critical resource vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to access arbitrary files on the server and obtain sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-24T06:30:29", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groupsession.jp/info/info-news/security20211220" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN79798166/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20874", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GroupSession Free edition, GroupSession byCloud, GroupSession ZION", "version": { "version_data": [ { "version_value": "GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier" } ] } } ] }, "vendor_name": "Japan Total System Co.,Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect permission assignment for critical resource vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to access arbitrary files on the server and obtain sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Assignment for Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://groupsession.jp/info/info-news/security20211220", "refsource": "MISC", "url": "https://groupsession.jp/info/info-news/security20211220" }, { "name": "https://jvn.jp/en/jp/JVN79798166/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN79798166/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20874", "datePublished": "2021-12-24T06:30:29", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:23.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20876
Vulnerability from cvelistv5
Published
2021-12-24 06:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Path traversal vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows an attacker with an administrative privilege to obtain sensitive information stored in the hierarchy above the directory on the published site's server via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://groupsession.jp/info/info-news/security20211220 | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN79798166/index.html | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:23.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groupsession.jp/info/info-news/security20211220" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN79798166/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GroupSession Free edition, GroupSession byCloud, GroupSession ZION", "vendor": "Japan Total System Co.,Ltd.", "versions": [ { "status": "affected", "version": "GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Path traversal vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows an attacker with an administrative privilege to obtain sensitive information stored in the hierarchy above the directory on the published site\u0027s server via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-24T06:30:32", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groupsession.jp/info/info-news/security20211220" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN79798166/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20876", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GroupSession Free edition, GroupSession byCloud, GroupSession ZION", "version": { "version_data": [ { "version_value": "GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier" } ] } } ] }, "vendor_name": "Japan Total System Co.,Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Path traversal vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows an attacker with an administrative privilege to obtain sensitive information stored in the hierarchy above the directory on the published site\u0027s server via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://groupsession.jp/info/info-news/security20211220", "refsource": "MISC", "url": "https://groupsession.jp/info/info-news/security20211220" }, { "name": "https://jvn.jp/en/jp/JVN79798166/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN79798166/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20876", "datePublished": "2021-12-24T06:30:32", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:23.073Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20875
Vulnerability from cvelistv5
Published
2021-12-24 06:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Open redirect vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks by having a user to access a specially crafted URL.
References
▼ | URL | Tags |
---|---|---|
https://groupsession.jp/info/info-news/security20211220 | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN79798166/index.html | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:23.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groupsession.jp/info/info-news/security20211220" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN79798166/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GroupSession Free edition, GroupSession byCloud, GroupSession ZION", "vendor": "Japan Total System Co.,Ltd.", "versions": [ { "status": "affected", "version": "GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Open redirect vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks by having a user to access a specially crafted URL." } ], "problemTypes": [ { "descriptions": [ { "description": "Open Redirect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-24T06:30:30", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groupsession.jp/info/info-news/security20211220" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN79798166/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GroupSession Free edition, GroupSession byCloud, GroupSession ZION", "version": { "version_data": [ { "version_value": "GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier" } ] } } ] }, "vendor_name": "Japan Total System Co.,Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Open redirect vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks by having a user to access a specially crafted URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Open Redirect" } ] } ] }, "references": { "reference_data": [ { "name": "https://groupsession.jp/info/info-news/security20211220", "refsource": "MISC", "url": "https://groupsession.jp/info/info-news/security20211220" }, { "name": "https://jvn.jp/en/jp/JVN79798166/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN79798166/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20875", "datePublished": "2021-12-24T06:30:30", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:23.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }