First published: Tue May 23 2023(Updated: )
Operation restriction bypass vulnerability in Message and Bulletin of Cybozu Garoon 4.6.0 to 5.9.2 allows a remote authenticated attacker to alter the data of Message and/or Bulletin.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Cybozu Garoon | >=4.6.0<=5.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-27304.
The severity of CVE-2023-27304 is medium with a severity value of 4.3.
Versions 4.6.0 to 5.9.2 of Cybozu Garoon are affected by CVE-2023-27304.
A remote authenticated attacker can exploit CVE-2023-27304 to alter the data of Message and/or Bulletin in Cybozu Garoon.
Yes, you can find more information about CVE-2023-27304 at the following references: [Link 1](https://cs.cybozu.co.jp/2023/007698.html), [Link 2](https://jvn.jp/en/jp/JVN41694426/)