Vulnerability Description
Electronic Delivery Check System (Doboku) Ver.18.1.0 and earlier, Electronic Delivery Check System (Dentsu) Ver.12.1.0 and earlier, Electronic Delivery Check System (Kikai) Ver.10.1.0 and earlier, and Electronic delivery item Inspection Support SystemVer.4.0.31 and earlier improperly restrict XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cals-Ed | Electronic Delivery Check System | < 11.0.0 |
| Cals-Ed | Electronic Delivery Item Inspection Support System | <= 4.0.31 |
Related Weaknesses (CWE)
References
- http://www.cals-ed.go.jp/checksys-release-20231130/Release Notes
- https://jvn.jp/en/jp/JVN77736613/Third Party Advisory
- https://www.ysk.nilim.go.jp/cals/Product
- http://www.cals-ed.go.jp/checksys-release-20231130/Release Notes
- https://jvn.jp/en/jp/JVN77736613/Third Party Advisory
- https://www.ysk.nilim.go.jp/cals/Product
FAQ
What is CVE-2024-21765?
CVE-2024-21765 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Electronic Delivery Check System (Doboku) Ver.18.1.0 and earlier, Electronic Delivery Check System (Dentsu) Ver.12.1.0 and earlier, Electronic Delivery Check System (Kikai) Ver.10.1.0 and earlier, and...
How severe is CVE-2024-21765?
CVE-2024-21765 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-21765?
Check the references section above for vendor advisories and patch information. Affected products include: Cals-Ed Electronic Delivery Check System, Cals-Ed Electronic Delivery Item Inspection Support System.