All the vulnerabilites related to SHIRASAGI Project - SHIRASAGI
jvndb-2023-000018
Vulnerability from jvndb
Published
2023-02-22 15:16
Modified
2024-06-10 17:18
Severity ?
Summary
Multiple cross-site scripting vulnerabilities in SHIRASAGI
Details
SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below.
* Stored cross-site scripting vulnerability on Schedule function (CWE-79) - CVE-2023-22425
* Stored cross-site scripting vulnerability on Theme switching function (CWE-79) - CVE-2023-22427
CVE-2023-22425
Ren Toda of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-22427
SHIRASAGI Project reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000018.html", "dc:date": "2024-06-10T17:18+09:00", "dcterms:issued": "2023-02-22T15:16+09:00", "dcterms:modified": "2024-06-10T17:18+09:00", "description": "SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below.\r\n\r\n * Stored cross-site scripting vulnerability on Schedule function (CWE-79) - CVE-2023-22425\r\n * Stored cross-site scripting vulnerability on Theme switching function (CWE-79) - CVE-2023-22427\r\n\r\nCVE-2023-22425\r\nRen Toda of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nCVE-2023-22427\r\nSHIRASAGI Project reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000018.html", "sec:cpe": { "#text": "cpe:/a:ss-proj:shirasagi", "@product": "SHIRASAGI", "@vendor": "SHIRASAGI Project", "@version": "2.2" }, "sec:cvss": [ { "@score": "3.5", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "5.4", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2023-000018", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN18765463/index.html", "@id": "JVN#18765463", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-22425", "@id": "CVE-2023-22425", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-22427", "@id": "CVE-2023-22427", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-22425", "@id": "CVE-2023-22425", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-22427", "@id": "CVE-2023-22427", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple cross-site scripting vulnerabilities in SHIRASAGI" }
jvndb-2023-000088
Vulnerability from jvndb
Published
2023-09-04 13:41
Modified
2024-05-14 17:58
Severity ?
Summary
Multiple vulnerabilities in SHIRASAGI
Details
SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below.
* Reflected cross-site scripting (CWE-79) - CVE-2023-36492
* Stored cross-site scripting (CWE-79) - CVE-2023-38569
* Path traversal (CWE-22) - CVE-2023-39448
CVE-2023-36492, CVE-2023-38569
Taiga Shirakura of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-39448
Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000088.html", "dc:date": "2024-05-14T17:58+09:00", "dcterms:issued": "2023-09-04T13:41+09:00", "dcterms:modified": "2024-05-14T17:58+09:00", "description": "SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below.\r\n\r\n * Reflected cross-site scripting (CWE-79) - CVE-2023-36492\r\n * Stored cross-site scripting (CWE-79) - CVE-2023-38569\r\n * Path traversal (CWE-22) - CVE-2023-39448\r\n\r\nCVE-2023-36492, CVE-2023-38569\r\nTaiga Shirakura of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nCVE-2023-39448\r\nMasashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000088.html", "sec:cpe": { "#text": "cpe:/a:ss-proj:shirasagi", "@product": "SHIRASAGI", "@vendor": "SHIRASAGI Project", "@version": "2.2" }, "sec:cvss": [ { "@score": "4.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2023-000088", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN82758000/index.html", "@id": "JVN#82758000", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-36492", "@id": "CVE-2023-36492", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38569", "@id": "CVE-2023-38569", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-39448", "@id": "CVE-2023-39448", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-36492", "@id": "CVE-2023-36492", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38569", "@id": "CVE-2023-38569", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-39448", "@id": "CVE-2023-39448", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple vulnerabilities in SHIRASAGI" }
jvndb-2019-000057
Vulnerability from jvndb
Published
2019-09-10 13:56
Modified
2019-09-10 13:56
Severity ?
Summary
SHIRASAGI vulnerable to open redirect
Details
SHIRASAGI provided by SHIRASAGI Project contains an open redirect vulnerability (CWE-601).
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN74699196/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6009 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2019-6009 | |
Improper Input Validation(CWE-20) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2019/JVNDB-2019-000057.html", "dc:date": "2019-09-10T13:56+09:00", "dcterms:issued": "2019-09-10T13:56+09:00", "dcterms:modified": "2019-09-10T13:56+09:00", "description": "SHIRASAGI provided by SHIRASAGI Project contains an open redirect vulnerability (CWE-601).\r\n\r\nToshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2019/JVNDB-2019-000057.html", "sec:cpe": { "#text": "cpe:/a:ss-proj:shirasagi", "@product": "SHIRASAGI", "@vendor": "SHIRASAGI Project", "@version": "2.2" }, "sec:cvss": [ { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.7", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2019-000057", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN74699196/index.html", "@id": "JVN#74699196", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6009", "@id": "CVE-2019-6009", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2019-6009", "@id": "CVE-2019-6009", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-20", "@title": "Improper Input Validation(CWE-20)" } ], "title": "SHIRASAGI vulnerable to open redirect" }
jvndb-2020-000045
Vulnerability from jvndb
Published
2020-07-09 15:08
Modified
2020-07-09 15:08
Severity ?
Summary
SHIRASAGI vulnerable to open redirect
Details
SHIRASAGI provided by SHIRASAGI Project contains an open redirect vulnerability (CWE-601).
Ryoya Koyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN55657988/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5607 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2020-5607 | |
Improper Input Validation(CWE-20) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-000045.html", "dc:date": "2020-07-09T15:08+09:00", "dcterms:issued": "2020-07-09T15:08+09:00", "dcterms:modified": "2020-07-09T15:08+09:00", "description": "SHIRASAGI provided by SHIRASAGI Project contains an open redirect vulnerability (CWE-601).\r\n\r\nRyoya Koyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\n JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-000045.html", "sec:cpe": { "#text": "cpe:/a:ss-proj:shirasagi", "@product": "SHIRASAGI", "@vendor": "SHIRASAGI Project", "@version": "2.2" }, "sec:cvss": [ { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.7", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2020-000045", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN55657988/index.html", "@id": "JVN#55657988", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5607", "@id": "CVE-2020-5607", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2020-5607", "@id": "CVE-2020-5607", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-20", "@title": "Improper Input Validation(CWE-20)" } ], "title": "SHIRASAGI vulnerable to open redirect" }
jvndb-2022-000083
Vulnerability from jvndb
Published
2022-10-25 15:10
Modified
2024-06-05 16:06
Severity ?
Summary
Multiple vulnerabilities in SHIRASAGI
Details
SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below.
<ul>
<li>Open Redirect (CWE-601) - CVE-2022-43479
<li>Stored Cross-site Scripting (CWE-79) - CVE-2022-43499</ul>
SHIGA TAKUMA of BroadBand Security, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI | |
SHIRASAGI Project | SHIRASAGI |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000083.html", "dc:date": "2024-06-05T16:06+09:00", "dcterms:issued": "2022-10-25T15:10+09:00", "dcterms:modified": "2024-06-05T16:06+09:00", "description": "SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below.\r\n\u003cul\u003e\r\n\u003cli\u003eOpen Redirect (CWE-601) - CVE-2022-43479\r\n\u003cli\u003eStored Cross-site Scripting (CWE-79) - CVE-2022-43499\u003c/ul\u003e\r\nSHIGA TAKUMA of BroadBand Security, Inc. reported these vulnerabilities to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000083.html", "sec:cpe": [ { "#text": "cpe:/a:ss-proj:shirasagi", "@product": "SHIRASAGI", "@vendor": "SHIRASAGI Project", "@version": "2.2" }, { "#text": "cpe:/a:ss-proj:shirasagi", "@product": "SHIRASAGI", "@vendor": "SHIRASAGI Project", "@version": "2.2" } ], "sec:cvss": [ { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.7", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-000083", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN86350682/index.html", "@id": "JVN#86350682", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-43479", "@id": "CVE-2022-43479", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-43499", "@id": "CVE-2022-43499", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43479", "@id": "CVE-2022-43479", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43499", "@id": "CVE-2022-43499", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "Multiple vulnerabilities in SHIRASAGI" }
jvndb-2024-000111
Vulnerability from jvndb
Published
2024-10-16 14:12
Modified
2024-10-23 17:35
Severity ?
Summary
SHIRASAGI vulnerable to path traversal
Details
SHIRASAGI provided by SHIRASAGI Project processes URLs in HTTP requests improperly, resulting in a path traversal vulnerability (CWE-22).
Shogo Kumamaru of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN58721679/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-46898 | |
Path Traversal(CWE-22) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000111.html", "dc:date": "2024-10-23T17:35+09:00", "dcterms:issued": "2024-10-16T14:12+09:00", "dcterms:modified": "2024-10-23T17:35+09:00", "description": "SHIRASAGI provided by SHIRASAGI Project processes URLs in HTTP requests improperly, resulting in a path traversal vulnerability (CWE-22).\r\n\r\nShogo Kumamaru of LAC Co., Ltd. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000111.html", "sec:cpe": { "#text": "cpe:/a:ss-proj:shirasagi", "@product": "SHIRASAGI", "@vendor": "SHIRASAGI Project", "@version": "2.2" }, "sec:cvss": { "@score": "8.6", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "@version": "3.0" }, "sec:identifier": "JVNDB-2024-000111", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN58721679/index.html", "@id": "JVN#58721679", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-46898", "@id": "CVE-2024-46898", "@source": "CVE" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" } ], "title": "SHIRASAGI vulnerable to path traversal" }
jvndb-2022-000043
Vulnerability from jvndb
Published
2022-06-09 13:31
Modified
2024-06-18 11:13
Severity ?
Summary
SHIRASAGI vulnerable to cross-site scripting
Details
SHIRASAGI provided by SHIRASAGI Project contains a cross-site scripting vulnerability (CWE-79).
hibiki moriyama of STNet, Incorporated reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN32962443/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-29485 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-29485 | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI | |
SHIRASAGI Project | SHIRASAGI |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000043.html", "dc:date": "2024-06-18T11:13+09:00", "dcterms:issued": "2022-06-09T13:31+09:00", "dcterms:modified": "2024-06-18T11:13+09:00", "description": "SHIRASAGI provided by SHIRASAGI Project contains a cross-site scripting vulnerability (CWE-79).\r\n\r\nhibiki moriyama of STNet, Incorporated reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000043.html", "sec:cpe": [ { "#text": "cpe:/a:ss-proj:shirasagi", "@product": "SHIRASAGI", "@vendor": "SHIRASAGI Project", "@version": "2.2" }, { "#text": "cpe:/a:ss-proj:shirasagi", "@product": "SHIRASAGI", "@vendor": "SHIRASAGI Project", "@version": "2.2" } ], "sec:cvss": [ { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "6.1", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-000043", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN32962443/index.html", "@id": "JVN#32962443", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-29485", "@id": "CVE-2022-29485", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-29485", "@id": "CVE-2022-29485", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "SHIRASAGI vulnerable to cross-site scripting" }
cve-2024-46898
Vulnerability from cvelistv5
Published
2024-10-15 06:10
Modified
2024-10-23 04:58
Severity ?
EPSS score ?
Summary
SHIRASAGI prior to v1.19.1 processes URLs in HTTP requests improperly, resulting in a path traversal vulnerability. If this vulnerability is exploited, arbitrary files on the server may be retrieved when processing crafted HTTP requests.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ss-proj:shirasagi:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "shirasagi", "vendor": "ss-proj", "versions": [ { "lessThan": "1.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-46898", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T13:46:04.867617Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T13:48:49.696Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "SHIRASAGI", "vendor": "SHIRASAGI Project", "versions": [ { "status": "affected", "version": "prior to v1.19.1" } ] } ], "descriptions": [ { "lang": "en", "value": "SHIRASAGI prior to v1.19.1 processes URLs in HTTP requests improperly, resulting in a path traversal vulnerability. If this vulnerability is exploited, arbitrary files on the server may be retrieved when processing crafted HTTP requests." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-23T04:58:28.816Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://github.com/shirasagi/shirasagi/commit/5ac4685d7e4330f949f13219069107fc5d768934" }, { "url": "https://www.ss-proj.org/" }, { "url": "https://jvn.jp/en/jp/JVN58721679/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-46898", "datePublished": "2024-10-15T06:10:30.968Z", "dateReserved": "2024-10-04T06:36:35.246Z", "dateUpdated": "2024-10-23T04:58:28.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22425
Vulnerability from cvelistv5
Published
2023-02-24 00:00
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
Stored cross-site scripting vulnerability in Schedule function of SHIRASAGI v1.16.2 and earlier versions allows a remote authenticated attacker to inject an arbitrary script.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi" }, { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/support/938.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN18765463/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SHIRASAGI", "vendor": "SHIRASAGI Project", "versions": [ { "status": "affected", "version": "v1.16.2 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting vulnerability in Schedule function of SHIRASAGI v1.16.2 and earlier versions allows a remote authenticated attacker to inject an arbitrary script." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-24T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.ss-proj.org/" }, { "url": "https://github.com/shirasagi/shirasagi" }, { "url": "https://www.ss-proj.org/support/938.html" }, { "url": "https://jvn.jp/en/jp/JVN18765463/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-22425", "datePublished": "2023-02-24T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-02T10:07:06.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29485
Vulnerability from cvelistv5
Published
2022-06-14 07:05
Modified
2024-08-03 06:26
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in SHIRASAGI v1.0.0 to v1.14.2, and v1.15.0 allows a remote attacker to inject an arbitrary script via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://www.ss-proj.org/ | x_refsource_MISC | |
https://github.com/shirasagi/shirasagi | x_refsource_MISC | |
https://www.ss-proj.org/support/843.html | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN32962443/index.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:26:05.835Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ss-proj.org/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ss-proj.org/support/843.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN32962443/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SHIRASAGI", "vendor": "SHIRASAGI Project", "versions": [ { "status": "affected", "version": "v1.0.0 to v1.14.2, and v1.15.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in SHIRASAGI v1.0.0 to v1.14.2, and v1.15.0 allows a remote attacker to inject an arbitrary script via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-14T07:05:39", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ss-proj.org/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shirasagi/shirasagi" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ss-proj.org/support/843.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN32962443/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-29485", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SHIRASAGI", "version": { "version_data": [ { "version_value": "v1.0.0 to v1.14.2, and v1.15.0" } ] } } ] }, "vendor_name": "SHIRASAGI Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in SHIRASAGI v1.0.0 to v1.14.2, and v1.15.0 allows a remote attacker to inject an arbitrary script via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ss-proj.org/", "refsource": "MISC", "url": "https://www.ss-proj.org/" }, { "name": "https://github.com/shirasagi/shirasagi", "refsource": "MISC", "url": "https://github.com/shirasagi/shirasagi" }, { "name": "https://www.ss-proj.org/support/843.html", "refsource": "MISC", "url": "https://www.ss-proj.org/support/843.html" }, { "name": "https://jvn.jp/en/jp/JVN32962443/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN32962443/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-29485", "datePublished": "2022-06-14T07:05:39", "dateReserved": "2022-05-13T00:00:00", "dateUpdated": "2024-08-03T06:26:05.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22427
Vulnerability from cvelistv5
Published
2023-02-24 00:00
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
Stored cross-site scripting vulnerability in Theme switching function of SHIRASAGI v1.16.2 and earlier versions allows a remote attacker with an administrative privilege to inject an arbitrary script.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi" }, { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/support/938.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN18765463/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SHIRASAGI", "vendor": "SHIRASAGI Project", "versions": [ { "status": "affected", "version": "v1.16.2 and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting vulnerability in Theme switching function of SHIRASAGI v1.16.2 and earlier versions allows a remote attacker with an administrative privilege to inject an arbitrary script." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-24T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.ss-proj.org/" }, { "url": "https://github.com/shirasagi/shirasagi" }, { "url": "https://www.ss-proj.org/support/938.html" }, { "url": "https://jvn.jp/en/jp/JVN18765463/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-22427", "datePublished": "2023-02-24T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-02T10:07:06.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36492
Vulnerability from cvelistv5
Published
2023-09-05 09:09
Modified
2024-09-30 17:26
Severity ?
EPSS score ?
Summary
Reflected cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:45:56.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/support/954.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN82758000/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36492", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-30T17:26:46.999024Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-30T17:26:59.102Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "SHIRASAGI", "vendor": "SHIRASAGI Project", "versions": [ { "status": "affected", "version": "prior to v1.18.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Reflected cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-05T09:09:44.818Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.ss-proj.org/support/954.html" }, { "url": "https://jvn.jp/en/jp/JVN82758000/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-36492", "datePublished": "2023-09-05T09:09:44.818Z", "dateReserved": "2023-08-09T02:20:29.499Z", "dateUpdated": "2024-09-30T17:26:59.102Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43479
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Open redirect vulnerability in SHIRASAGI v1.14.4 to v1.15.0 allows a remote unauthenticated attacker to redirect users to an arbitrary web site and conduct a phishing attack.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi" }, { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/support/928.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN86350682/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SHIRASAGI", "vendor": "SHIRASAGI Project", "versions": [ { "status": "affected", "version": "v1.14.4 to v1.15.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Open redirect vulnerability in SHIRASAGI v1.14.4 to v1.15.0 allows a remote unauthenticated attacker to redirect users to an arbitrary web site and conduct a phishing attack." } ], "problemTypes": [ { "descriptions": [ { "description": "Open Redirect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-05T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.ss-proj.org/" }, { "url": "https://github.com/shirasagi/shirasagi" }, { "url": "https://www.ss-proj.org/support/928.html" }, { "url": "https://jvn.jp/en/jp/JVN86350682/index.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-43479", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-10-20T00:00:00", "dateUpdated": "2024-08-03T13:32:59.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43499
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Stored cross-site scripting vulnerability in SHIRASAGI versions prior to v1.16.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi" }, { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/support/928.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN86350682/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SHIRASAGI", "vendor": "SHIRASAGI Project", "versions": [ { "status": "affected", "version": "versions prior to v1.16.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting vulnerability in SHIRASAGI versions prior to v1.16.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-05T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.ss-proj.org/" }, { "url": "https://github.com/shirasagi/shirasagi" }, { "url": "https://www.ss-proj.org/support/928.html" }, { "url": "https://jvn.jp/en/jp/JVN86350682/index.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-43499", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-10-20T00:00:00", "dateUpdated": "2024-08-03T13:32:59.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5607
Vulnerability from cvelistv5
Published
2020-07-10 01:30
Modified
2024-08-04 08:30
Severity ?
EPSS score ?
Summary
Open redirect vulnerability in SHIRASAGI v1.13.1 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://www.ss-proj.org/ | x_refsource_MISC | |
https://github.com/shirasagi/shirasagi | x_refsource_MISC | |
https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a | x_refsource_MISC | |
https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a.patch | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN55657988/index.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:30:24.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ss-proj.org/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a.patch" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN55657988/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SHIRASAGI", "vendor": "SHIRASAGI Project", "versions": [ { "status": "affected", "version": "v1.13.1 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Open redirect vulnerability in SHIRASAGI v1.13.1 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Open Redirect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-10T01:30:18", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ss-proj.org/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shirasagi/shirasagi" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a.patch" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN55657988/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5607", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SHIRASAGI", "version": { "version_data": [ { "version_value": "v1.13.1 and earlier" } ] } } ] }, "vendor_name": "SHIRASAGI Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Open redirect vulnerability in SHIRASAGI v1.13.1 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Open Redirect" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ss-proj.org/", "refsource": "MISC", "url": "https://www.ss-proj.org/" }, { "name": "https://github.com/shirasagi/shirasagi", "refsource": "MISC", "url": "https://github.com/shirasagi/shirasagi" }, { "name": "https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a", "refsource": "MISC", "url": "https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a" }, { "name": "https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a.patch", "refsource": "MISC", "url": "https://github.com/shirasagi/shirasagi/commit/040a02c9d4b5dd2f91c5c29c0008a47cde6ee99a.patch" }, { "name": "https://jvn.jp/en/jp/JVN55657988/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN55657988/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5607", "datePublished": "2020-07-10T01:30:18", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:30:24.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38569
Vulnerability from cvelistv5
Published
2023-09-05 09:10
Modified
2024-09-30 17:26
Severity ?
EPSS score ?
Summary
Stored cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:46:56.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/support/954.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN82758000/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38569", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-30T17:26:03.643737Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-30T17:26:17.223Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "SHIRASAGI ", "vendor": "SHIRASAGI Project ", "versions": [ { "status": "affected", "version": "prior to v1.18.0 " } ] } ], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-05T09:10:17.838Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.ss-proj.org/support/954.html" }, { "url": "https://jvn.jp/en/jp/JVN82758000/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-38569", "datePublished": "2023-09-05T09:10:17.838Z", "dateReserved": "2023-08-09T02:20:28.470Z", "dateUpdated": "2024-09-30T17:26:17.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-6009
Vulnerability from cvelistv5
Published
2019-09-12 15:58
Modified
2024-08-04 20:09
Severity ?
EPSS score ?
Summary
Open redirect vulnerability in SHIRASAGI v1.7.0 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://www.ss-proj.org/ | x_refsource_MISC | |
https://github.com/shirasagi/shirasagi | x_refsource_MISC | |
https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3 | x_refsource_MISC | |
https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch | x_refsource_MISC | |
http://jvn.jp/en/jp/JVN74699196/index.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:09:23.960Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ss-proj.org/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN74699196/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SHIRASAGI", "vendor": "SHIRASAGI Project", "versions": [ { "status": "affected", "version": "v1.7.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Open redirect vulnerability in SHIRASAGI v1.7.0 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Open Redirect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-12T15:58:55", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ss-proj.org/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shirasagi/shirasagi" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch" }, { "tags": [ "x_refsource_MISC" ], "url": "http://jvn.jp/en/jp/JVN74699196/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2019-6009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SHIRASAGI", "version": { "version_data": [ { "version_value": "v1.7.0 and earlier" } ] } } ] }, "vendor_name": "SHIRASAGI Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Open redirect vulnerability in SHIRASAGI v1.7.0 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Open Redirect" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ss-proj.org/", "refsource": "MISC", "url": "https://www.ss-proj.org/" }, { "name": "https://github.com/shirasagi/shirasagi", "refsource": "MISC", "url": "https://github.com/shirasagi/shirasagi" }, { "name": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3", "refsource": "MISC", "url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3" }, { "name": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch", "refsource": "MISC", "url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch" }, { "name": "http://jvn.jp/en/jp/JVN74699196/index.html", "refsource": "MISC", "url": "http://jvn.jp/en/jp/JVN74699196/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2019-6009", "datePublished": "2019-09-12T15:58:55", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-04T20:09:23.960Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39448
Vulnerability from cvelistv5
Published
2023-09-05 08:28
Modified
2024-09-30 15:46
Severity ?
EPSS score ?
Summary
Path traversal vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to alter or create arbitrary files on the server, resulting in arbitrary code execution.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
SHIRASAGI Project | SHIRASAGI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.ss-proj.org/support/954.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN82758000/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39448", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-30T15:45:48.298745Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-30T15:46:01.328Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "SHIRASAGI", "vendor": "SHIRASAGI Project", "versions": [ { "status": "affected", "version": "prior to v1.18.0 " } ] } ], "descriptions": [ { "lang": "en", "value": "Path traversal vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to alter or create arbitrary files on the server, resulting in arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-05T08:28:06.883Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.ss-proj.org/support/954.html" }, { "url": "https://jvn.jp/en/jp/JVN82758000/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-39448", "datePublished": "2023-09-05T08:28:06.883Z", "dateReserved": "2023-08-09T02:20:27.425Z", "dateUpdated": "2024-09-30T15:46:01.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }