GRANDIT Ver.1.6, Ver.2.0, Ver.2.1, Ver.2.2, Ver.2.3, and Ver.3.0 do not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and then alter or disclose the information via unspecified vectors.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN73472345/index.html | Third Party Advisory |
https://www.grandit.jp/etc/20200228_letter.pdf | Vendor Advisory |
https://jvn.jp/en/jp/JVN73472345/index.html | Third Party Advisory |
https://www.grandit.jp/etc/20200228_letter.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/en/jp/JVN73472345/index.html - Third Party Advisory | |
References | () https://www.grandit.jp/etc/20200228_letter.pdf - Vendor Advisory |
Information
Published : 2020-03-02 08:15
Updated : 2024-11-21 05:34
NVD link : CVE-2020-5539
Mitre link : CVE-2020-5539
CVE.ORG link : CVE-2020-5539
JSON object : View
Products Affected
grandit
- grandit
CWE
CWE-639
Authorization Bypass Through User-Controlled Key