CVE-2016-1151

Published on: 02/16/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Office from Cybozu contain the following vulnerability:

Multiple cross-site request forgery (CSRF) vulnerabilities in Cybozu Office 9.9.0 through 10.3.0 allow remote attackers to hijack the authentication of arbitrary users.

  • CVE-2016-1151 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
JVN#64209269: Cybozu Office vulnerable to cross-site request forgery Vendor Advisory
jvn.jp
text/xml
URL Logo JVN JVN#64209269
複数の機能にクロスサイトリクエストフォージェリ(CSRF)の脆弱性[CyVDB-768](2016/01/18) | サイボウズからのお知らせ Vendor Advisory
cs.cybozu.co.jp
text/html
URL Logo CONFIRM cs.cybozu.co.jp/2016/006111.html
No Description Provided Vendor Advisory
jvndb.jvn.jp
text/html
URL Logo JVNDB JVNDB-2016-000024

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCybozuOffice10.0.0AllAllAll
ApplicationCybozuOffice10.0.1AllAllAll
ApplicationCybozuOffice10.0.2AllAllAll
ApplicationCybozuOffice10.1.0AllAllAll
ApplicationCybozuOffice10.1.2AllAllAll
ApplicationCybozuOffice10.2.0AllAllAll
ApplicationCybozuOffice10.3.0AllAllAll
ApplicationCybozuOffice9.9.0AllAllAll
ApplicationCybozuOffice10.0.0AllAllAll
ApplicationCybozuOffice10.0.1AllAllAll
ApplicationCybozuOffice10.0.2AllAllAll
ApplicationCybozuOffice10.1.0AllAllAll
ApplicationCybozuOffice10.1.2AllAllAll
ApplicationCybozuOffice10.2.0AllAllAll
ApplicationCybozuOffice10.3.0AllAllAll
ApplicationCybozuOffice9.9.0AllAllAll
  • cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:9.9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:office:9.9.0:*:*:*:*:*:*:*: