Search criteria
4 vulnerabilities found for logstorage by infoscience
FKIE_CVE-2020-5626
Vulnerability from fkie_nvd - Published: 2021-01-28 11:15 - Updated: 2024-11-21 05:34
Severity ?
Summary
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN41853173/index.html | Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN41853173/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| infoscience | elc_analytics | * | |
| infoscience | logstorage | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:infoscience:elc_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9A52FED-B68B-496E-817C-44D64B19900B",
"versionEndIncluding": "3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:infoscience:logstorage:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9001E07-1BEF-4EA0-AD46-F6C69F1D5D6C",
"versionEndIncluding": "8.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file."
},
{
"lang": "es",
"value": "Logstorage versiones 8.0.0 y anteriores, y ELC Analytics versiones 3.0.0 y anteriores, permiten a atacantes remotos ejecutar comandos arbitrarios del Sistema Operativo por medio de un archivo de registro especialmente dise\u00f1ado"
}
],
"id": "CVE-2020-5626",
"lastModified": "2024-11-21T05:34:23.043",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-28T11:15:12.777",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN41853173/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN41853173/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2020-5626 (GCVE-0-2020-5626)
Vulnerability from cvelistv5 – Published: 2021-01-28 10:00 – Updated: 2024-08-04 08:39
VLAI?
Summary
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
Severity ?
No CVSS data available.
CWE
- OS Command Injection
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Infoscience Corporation | Logstorage and ELC Analytics |
Affected:
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:39:25.686Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN41853173/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Logstorage and ELC Analytics",
"vendor": "Infoscience Corporation",
"versions": [
{
"status": "affected",
"version": "Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS Command Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-28T10:00:27",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN41853173/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5626",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Logstorage and ELC Analytics",
"version": {
"version_data": [
{
"version_value": "Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier"
}
]
}
}
]
},
"vendor_name": "Infoscience Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173",
"refsource": "MISC",
"url": "https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173"
},
{
"name": "https://jvn.jp/en/jp/JVN41853173/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN41853173/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5626",
"datePublished": "2021-01-28T10:00:28",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:39:25.686Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5626 (GCVE-0-2020-5626)
Vulnerability from nvd – Published: 2021-01-28 10:00 – Updated: 2024-08-04 08:39
VLAI?
Summary
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
Severity ?
No CVSS data available.
CWE
- OS Command Injection
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Infoscience Corporation | Logstorage and ELC Analytics |
Affected:
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:39:25.686Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN41853173/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Logstorage and ELC Analytics",
"vendor": "Infoscience Corporation",
"versions": [
{
"status": "affected",
"version": "Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS Command Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-28T10:00:27",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/jp/JVN41853173/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5626",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Logstorage and ELC Analytics",
"version": {
"version_data": [
{
"version_value": "Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier"
}
]
}
}
]
},
"vendor_name": "Infoscience Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173",
"refsource": "MISC",
"url": "https://www.logstorage.com/support/vulnerability_info.html#jvn-41853173"
},
{
"name": "https://jvn.jp/en/jp/JVN41853173/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/jp/JVN41853173/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5626",
"datePublished": "2021-01-28T10:00:28",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:39:25.686Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
JVNDB-2021-000007
Vulnerability from jvndb - Published: 2021-01-27 18:31 - Updated:2022-07-26 15:53
Severity ?
Summary
OS command injection vulnerability in multiple Infoscience Corporation log management tools
Details
Infoscience Corporation's multiple log management tools provide an FTP upload function as one of the log collection methods, and is able to set to allow the adminitrators to accept FTP uploads.
In a situation where the FTP upload function is enabled and there is a flaw of input value handling in the log processing, a remote attacker who can upload a crafted log via FTP may execute an arbitrary OS command on the server where the products are running (CWE-78).
Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000007.html",
"dc:date": "2022-07-26T15:53+09:00",
"dcterms:issued": "2021-01-27T18:31+09:00",
"dcterms:modified": "2022-07-26T15:53+09:00",
"description": "Infoscience Corporation\u0027s multiple log management tools provide an FTP upload function as one of the log collection methods, and is able to set to allow the adminitrators to accept FTP uploads.\r\nIn a situation where the FTP upload function is enabled and there is a flaw of input value handling in the log processing, a remote attacker who can upload a crafted log via FTP may execute an arbitrary OS command on the server where the products are running (CWE-78).\r\n\r\nTaizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000007.html",
"sec:cpe": [
{
"#text": "cpe:/a:infoscience:elc_analytics",
"@product": "ELC Analytics",
"@vendor": "Infoscience",
"@version": "2.2"
},
{
"#text": "cpe:/a:infoscience:logstorage",
"@product": "Logstorage",
"@vendor": "Infoscience",
"@version": "2.2"
}
],
"sec:cvss": [
{
"@score": "7.1",
"@severity": "High",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
"@version": "2.0"
},
{
"@score": "7.5",
"@severity": "High",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2021-000007",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN41853173/index.html",
"@id": "JVN#41853173",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5626",
"@id": "CVE-2020-5626",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2020-5626",
"@id": "CVE-2020-5626",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-78",
"@title": "OS Command Injection(CWE-78)"
}
],
"title": "OS command injection vulnerability in multiple Infoscience Corporation log management tools"
}