SeedDMS における入力確認に関する脆弱性
| Title |
SeedDMS における入力確認に関する脆弱性
|
| Summary |
SeedDMS には、入力確認に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
July 2, 2018, midnight |
| Registration Date |
Nov. 5, 2018, 5:04 p.m. |
| Last Update |
Nov. 5, 2018, 5:04 p.m. |
|
CVSS3.0 : 重要
|
| Score |
8.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
9
|
| Vector |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
Affected System
| Uwe Steinmann |
|
SeedDMS 5.1.8 未満
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年11月05日] 掲載 |
Nov. 5, 2018, 5:04 p.m. |
NVD Vulnerability Information
CVE-2018-12941
| Summary |
This vulnerability allows remote attackers to execute arbitrary code in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 by adding a system command at the end of the "cacheDir" path and following usage of the "Clear Cache" functionality. This allows an authenticated attacker, with permission to the Settings functionality, to inject arbitrary system commands within the application by manipulating the "Cache directory" path. An attacker can use it to perform malicious tasks such as to extract, change, or delete sensitive information or run system commands on the underlying operating system.
|
| Publication Date |
July 31, 2018, 11:29 p.m. |
| Registration Date |
March 1, 2021, 6:51 p.m. |
| Last Update |
Nov. 21, 2024, 12:46 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:seeddms:seeddms:*:*:*:*:*:*:*:* |
|
|
|
5.1.8 |
Related information, measures and tools
Common Vulnerabilities List