Vulnerability Description
Cybozu Garoon 3.x and 4.x before 4.2.1 allows remote authenticated users to bypass intended restrictions on reading, creating, or modifying a portlet via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cybozu | Garoon | 3.1.0 |
References
- http://jvn.jp/en/jp/JVN18975349/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2016-000093Vendor Advisory
- https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03
- https://support.cybozu.com/ja-jp/article/9020Vendor Advisory
- http://jvn.jp/en/jp/JVN18975349/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2016-000093Vendor Advisory
- https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03
- https://support.cybozu.com/ja-jp/article/9020Vendor Advisory
FAQ
What is CVE-2016-1189?
CVE-2016-1189 is a vulnerability with a CVSS score of 8.1 (HIGH). Cybozu Garoon 3.x and 4.x before 4.2.1 allows remote authenticated users to bypass intended restrictions on reading, creating, or modifying a portlet via unspecified vectors.
How severe is CVE-2016-1189?
CVE-2016-1189 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1189?
Check the references section above for vendor advisories and patch information. Affected products include: Cybozu Garoon.