First published: Sat Dec 28 2013(Updated: )
Cybozu Garoon 3.5 through 3.7 SP2 allows remote attackers to bypass Keitai authentication via a modified user ID in a request.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Cybozu Garoon | =3.5 | |
Cybozu Garoon | =3.5-sp1 | |
Cybozu Garoon | =3.5-sp2 | |
Cybozu Garoon | =3.5-sp3 | |
Cybozu Garoon | =3.5-sp4 | |
Cybozu Garoon | =3.5-sp5 | |
Cybozu Garoon | =3.5.3 | |
Cybozu Garoon | =3.7 | |
Cybozu Garoon | =3.7-sp1 | |
Cybozu Garoon | =3.7-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6006 is classified as a medium severity vulnerability due to its potential to allow unauthorized access.
To fix CVE-2013-6006, upgrade Cybozu Garoon to version 3.7 SP3 or later.
CVE-2013-6006 affects Cybozu Garoon versions 3.5 through 3.7 SP2.
CVE-2013-6006 enables remote attackers to bypass Keitai authentication.
Yes, CVE-2013-6006 can be easily exploited by modifying the user ID in a request.