Lucene search

K
jvnJapan Vulnerability NotesJVN:35906450
HistoryJan 14, 2021 - 12:00 a.m.

JVN#35906450: Multiple vulnerabilities in acmailer

2021-01-1400:00:00
Japan Vulnerability Notes
jvn.jp
55
improper access control
privilege chaining
remote attacker
os command
administrative privileges
sensitive information
update the software
apply workarounds
acmailer ver. 4.0.3
acmailer db ver. 1.1.5
cve-2021-20617
cve-2021-20618

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.008

Percentile

81.9%

acmailer provided by Seeds Co.,Ltd. contains multiple vulnerabilities listed below.

Improper Access Control (CWE-284) - CVE-2021-20617

Version Vector Score
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 9.8
CVSS v2 AV:N/AC:L/Au:N/C:P/I:P/A:P Base Score: 7.5

Privilege Chaining (CWE-268) - CVE-2021-20618

Version Vector Score
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 9.8
CVSS v2 AV:N/AC:L/Au:N/C:P/I:P/A:P Base Score: 7.5

Impact

  • A remote attacker may execute an arbitrary OS command/obtain administrative privileges and as a result, sensitive information on the server may be obtained - CVE-2021-20617
  • A remote attacker may obtain administrative privileges and as a result, sensitive information on the server may be obtained - CVE-2021-20618

Solution

Update the software
Update the software to the latest version according to the information provided by the developer.
According to the developer, these vulnerabilities have been already addressed in the following versions.

  • acmailer ver. 4.0.3 or later

  • acmailer DB ver. 1.1.5 or later
    Apply workarounds
    Applying workarounds may mitigate the impacts of these vulnerabilities.
    CVE-2021-20617

  • Delete the following file in the folder directly below the folder where the product is placed.

    • init_ctl.cgi
      CVE-2021-20618
  • Delete the following file in the folder directly below the folder where the product is placed.

    • enq_detail.cgi
    • enq_detail_mail.cgi
    • enq_edit.cgi
    • enq_form.cgi
    • enq_list.cgi

Products Affected

CVE-2021-20617

  • acmailer ver. 4.0.1 and earlier

  • acmailer DB ver. 1.1.3 and earlier
    CVE-2021-20618

  • acmailer ver. 4.0.2 and earlier

  • acmailer DB ver. 1.1.4 and earlier

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.008

Percentile

81.9%

Related for JVN:35906450