Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-39448: JVN#82758000: Multiple vulnerabilities in SHIRASAGI

Path traversal vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to alter or create arbitrary files on the server, resulting in arbitrary code execution.

CVE
#xss#vulnerability#web#auth

Published:2023/09/04 Last Updated:2023/09/04

Overview

SHIRASAGI contains multiple vulnerabilities.

Products Affected

  • SHIRASAGI versions prior to v1.18.0

Description

SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below.

  • Reflected cross-site scripting (CWE-79) - CVE-2023-36492

    CVSS v3

    CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

    Base Score: 6.1

    CVSS v2

    AV:N/AC:H/Au:N/C:N/I:P/A:N

    Base Score: 2.6

  • Stored cross-site scripting (CWE-79) - CVE-2023-38569

    CVSS v3

    CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

    Base Score: 5.4

    CVSS v2

    AV:N/AC:M/Au:S/C:N/I:P/A:N

    Base Score: 3.5

  • Path traversal (CWE-22) - CVE-2023-39448

    CVSS v3

    CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

    Base Score: 4.3

    CVSS v2

    AV:N/AC:L/Au:S/C:N/I:P/A:N

    Base Score: 4.0

Impact

  • A remote attacker may execute an arbitrary script on the web browser of the user who is logging in to the product - CVE-2023-36492, CVE-2023-38569
  • A user of the product may alter or create arbitrary files on the server, resulting in arbitrary code execution - CVE-2023-39448

Solution

Update the Software
Update to the latest version according to the information provided by the developer.
The developer has released the version listed below that addresses the vulnerabilities.

  • SHIRASAGI v1.18.0

For more information, refer to the information provided by the developer.

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

CVE-2023-36492, CVE-2023-38569
Taiga Shirakura of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

CVE-2023-39448
Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907