CVE-2020-5539

GRANDIT Ver.1.6, Ver.2.0, Ver.2.1, Ver.2.2, Ver.2.3, and Ver.3.0 do not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and then alter or disclose the information via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:grandit:grandit:1.6:*:*:*:*:*:*:*
cpe:2.3:a:grandit:grandit:2.0:*:*:*:*:*:*:*
cpe:2.3:a:grandit:grandit:2.1:*:*:*:*:*:*:*
cpe:2.3:a:grandit:grandit:2.2:*:*:*:*:*:*:*
cpe:2.3:a:grandit:grandit:2.3:*:*:*:*:*:*:*
cpe:2.3:a:grandit:grandit:3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:34

Type Values Removed Values Added
References () https://jvn.jp/en/jp/JVN73472345/index.html - Third Party Advisory () https://jvn.jp/en/jp/JVN73472345/index.html - Third Party Advisory
References () https://www.grandit.jp/etc/20200228_letter.pdf - Vendor Advisory () https://www.grandit.jp/etc/20200228_letter.pdf - Vendor Advisory

Information

Published : 2020-03-02 08:15

Updated : 2024-11-21 05:34


NVD link : CVE-2020-5539

Mitre link : CVE-2020-5539

CVE.ORG link : CVE-2020-5539


JSON object : View

Products Affected

grandit

  • grandit
CWE
CWE-639

Authorization Bypass Through User-Controlled Key