jvndb-2022-000039
Vulnerability from jvndb
Published
2022-05-27 16:09
Modified
2024-06-18 16:31
Severity ?
Summary
RevoWorks incomplete filtering of MS Office v4 macros
Details
RevoWorks SCVX, RevoWorks Browser and RevoWorks Desktop provided by J's Communication Co., Ltd. enables users to execute web browsers, accessing drives, folders, files and registries in a sandboxed environment. Users can download files from the internet to the sandboxed environment, sanitizing through "File Sanitization Library" or "File Sanitization Option", and import to the local environment.
"File Sanitization Library" and "File Sanitization Option" are implemented with some third-party component, but the component's filtering functionality is incomplete, fails to detect nor remove Microsoft Excel 4.0 (XLM) Macros (CWE-791).
The developer reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and the developer coordinated under the Information Security Early Warning Partnership.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000039.html", "dc:date": "2024-06-18T16:31+09:00", "dcterms:issued": "2022-05-27T16:09+09:00", "dcterms:modified": "2024-06-18T16:31+09:00", "description": "RevoWorks SCVX, RevoWorks Browser and RevoWorks Desktop provided by J\u0027s Communication Co., Ltd. enables users to execute web browsers, accessing drives, folders, files and registries in a sandboxed environment. Users can download files from the internet to the sandboxed environment, sanitizing through \"File Sanitization Library\" or \"File Sanitization Option\", and import to the local environment.\r\n\"File Sanitization Library\" and \"File Sanitization Option\" are implemented with some third-party component, but the component\u0027s filtering functionality is incomplete, fails to detect nor remove Microsoft Excel 4.0 (XLM) Macros (CWE-791).\r\n\r\nThe developer reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and the developer coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000039.html", "sec:cpe": [ { "#text": "cpe:/a:jscom:revoworks_browser", "@product": "RevoWorks Browser", "@vendor": "J\u0027s Communication Co., Ltd.", "@version": "2.2" }, { "#text": "cpe:/a:jscom:revoworks_desktop", "@product": "RevoWorks Desktop", "@vendor": "J\u0027s Communication Co., Ltd.", "@version": "2.2" }, { "#text": "cpe:/a:jscom:revoworks_scvx", "@product": "RevoWorks SCVX", "@vendor": "J\u0027s Communication Co., Ltd.", "@version": "2.2" } ], "sec:cvss": [ { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "@version": "2.0" }, { "@score": "5.2", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-000039", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN27256219/index.html", "@id": "JVN#27256219", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-27176", "@id": "CVE-2022-27176", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-27176", "@id": "CVE-2022-27176", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "RevoWorks incomplete filtering of MS Office v4 macros" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.