First published: Tue Jun 30 2020(Updated: )
Path traversal vulnerability in Cybozu Garoon 5.0.0 to 5.0.1 allows attacker with administrator rights to obtain unintended information via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Cybozu Garoon | =5.0.0 | |
Cybozu Garoon | =5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-5588 is medium with a CVSS score of 4.9.
The path traversal vulnerability in Cybozu Garoon 5.0.0 to 5.0.1 allows an attacker with administrator rights to obtain unintended information by manipulating file paths.
No, an attacker requires administrator rights to exploit CVE-2020-5588.
To fix the path traversal vulnerability, it is recommended to update Cybozu Garoon to a version that has addressed the issue.
You can find more information about CVE-2020-5588 at the following references: [link1](https://jvn.jp/en/jp/JVN55497111/index.html), [link2](https://kb.cybozu.support/article/36410/).