GRANDIT Ver.1.6, Ver.2.0, Ver.2.1, Ver.2.2, Ver.2.3, and Ver.3.0 do not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and then alter or disclose the information via unspecified vectors.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN73472345/index.html | Third Party Advisory |
https://www.grandit.jp/etc/20200228_letter.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-03-02 00:15
Updated : 2020-03-04 11:56
NVD link : CVE-2020-5539
Mitre link : CVE-2020-5539
JSON object : View
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
Products Affected
grandit
- grandit