Headline
CVE-2023-22296: Multiple vulnerabilities in MAHO-PBX NetDevancer series
Reflected cross-site scripting vulnerability in MAHO-PBX NetDevancer series MAHO-PBX NetDevancer Lite/Uni/Pro/Cloud prior to Ver.1.11.00, MAHO-PBX NetDevancer VSG Lite/Uni prior to Ver.1.11.00, and MAHO-PBX NetDevancer MobileGate Home/Office prior to Ver.1.11.00 allows a remote unauthenticated attacker to inject an arbitrary script.
Published:2023/01/11 Last Updated:2023/01/11
Overview
MAHO-PBX NetDevancer series provided by Mahoroba Kobo, Inc. contain multiple vulnerabilities.
Products Affected
- MAHO-PBX NetDevancer Lite/Uni/Pro/Cloud prior to Ver.1.11.00
- MAHO-PBX NetDevancer VSG Lite/Uni prior to Ver.1.11.00
- MAHO-PBX NetDevancer MobileGate Home/Office prior to Ver.1.11.00
Description
There are multiple vulnerabilities in the Management screen of MAHO-PBX NetDevancer series provided by Mahoroba Kobo, Inc.
OS Command Injection (CWE-78) - CVE-2023-22279
CVSS v3
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score: 9.8
CVSS v2
AV:N/AC:L/Au:N/C:C/I:C/A:C
Base Score: 10.0
OS Command Injection (CWE-78) - CVE-2023-22280
CVSS v3
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score: 7.2
CVSS v2
AV:N/AC:L/Au:S/C:C/I:C/A:C
Base Score: 9.0
Cross-Site Request Forgery (CWE-352) - CVE-2023-22286
CVSS v3
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Base Score: 4.3
CVSS v2
AV:N/AC:H/Au:N/C:N/I:P/A:N
Base Score: 2.6
Reflected Cross-site Scripting (CWE-79) - CVE-2023-22296
CVSS v3
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Base Score: 6.1
CVSS v2
AV:N/AC:H/Au:N/C:N/I:P/A:N
Base Score: 2.6
Impact
- An arbitrary OS command may be executed by a remote attacker - CVE-2023-22279
- An arbitrary OS command may be executed by an attacker who can log in to the product - CVE-2023-22280
- If a user views a malicious page while logged in, unintended operations may be performed - CVE-2023-22286
- An arbitrary script may be executed on the web browser of the user who is using the product - CVE-2023-22296
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer.
Vendor Status
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Masamu Asato of GMO Cyber Security by IERAE reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information