Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote attacker to hijack the authentication of administrators via a specially crafted URL.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Groupsession | Groupsession | >= 2.20, < 5.1.0 |
| Groupsession | Groupsession Bycloud | >= 3.0.3, < 5.1.0 |
| Groupsession | Groupsession Zion | >= 3.0.3, < 5.1.0 |
Related Weaknesses (CWE)
References
- https://groupsession.jp/info/info-news/security202107Vendor Advisory
- https://jvn.jp/en/jp/JVN86026700/index.htmlThird Party Advisory
- https://groupsession.jp/info/info-news/security202107Vendor Advisory
- https://jvn.jp/en/jp/JVN86026700/index.htmlThird Party Advisory
FAQ
What is CVE-2021-20786?
CVE-2021-20786 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site request forgery (CSRF) vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ve...
How severe is CVE-2021-20786?
CVE-2021-20786 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-20786?
Check the references section above for vendor advisories and patch information. Affected products include: Groupsession Groupsession, Groupsession Groupsession Bycloud, Groupsession Groupsession Zion.