First published: Sun Jun 19 2016(Updated: )
Directory traversal vulnerability in the logging implementation in Cybozu Garoon 3.7 through 4.2 allows remote authenticated users to read a log file via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Cybozu Garoon | =3.7.0 | |
Cybozu Garoon | =3.7.1 | |
Cybozu Garoon | =3.7.2 | |
Cybozu Garoon | =3.7.3 | |
Cybozu Garoon | =3.7.4 | |
Cybozu Garoon | =3.7.5 | |
Cybozu Garoon | =4.0.0 | |
Cybozu Garoon | =4.0.1 | |
Cybozu Garoon | =4.0.2 | |
Cybozu Garoon | =4.0.3 | |
Cybozu Garoon | =4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1192 has been assigned a medium severity rating due to its potential for exposing sensitive log files to authenticated users.
To fix CVE-2016-1192, update Cybozu Garoon to the latest version available after version 4.2.
CVE-2016-1192 affects users running Cybozu Garoon versions 3.7.0 to 4.2.0.
CVE-2016-1192 is categorized as a directory traversal vulnerability.
Mitigation of CVE-2016-1192 without updating is limited; secure configurations and user access restrictions may help reduce risk.