CVE-2016-7833

Published on: 06/09/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Certain versions of Dezie from Cybozu contain the following vulnerability:

Cybozu Dezie 8.0.0 to 8.1.1 allows remote attackers to bypass access restrictions to delete an arbitrary DBM (Cybozu Dezie proprietary format) file via unspecified vectors.

  • CVE-2016-7833 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: URL Logo Cybozu, Inc. - Cybozu Dezie version 8.0.0 to 8.1.1

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH NONE

CVSS2 Score: 6.4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL PARTIAL

CVE References

Description Tags Link
JVN#16781735: Multiple access restriction bypass vulnerabilities in Cybozu Dezie Third Party Advisory
VDB Entry
jvn.jp
text/xml
URL Logo JVN JVN#16781735
Cybozu Dezie JVN#16781735 Multiple Security Bypass Vulnerabilities Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 94831
サイボウズ 不具合情報公開サイト - [CyVDB-1240]ライブラリに関する操作制限回避の脆弱性 Vendor Advisory
support.cybozu.com
text/html
URL Logo CONFIRM support.cybozu.com/ja-jp/article/9741

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCybozuDezie8.0.2AllAllAll
ApplicationCybozuDezie8.0.3AllAllAll
ApplicationCybozuDezie8.0.4AllAllAll
ApplicationCybozuDezie8.0.5AllAllAll
ApplicationCybozuDezie8.0.6AllAllAll
ApplicationCybozuDezie8.0.7AllAllAll
ApplicationCybozuDezie8.1.0AllAllAll
ApplicationCybozuDezie8.1.1AllAllAll
ApplicationCybozuDezie8.0.2AllAllAll
ApplicationCybozuDezie8.0.3AllAllAll
ApplicationCybozuDezie8.0.4AllAllAll
ApplicationCybozuDezie8.0.5AllAllAll
ApplicationCybozuDezie8.0.6AllAllAll
ApplicationCybozuDezie8.0.7AllAllAll
ApplicationCybozuDezie8.1.0AllAllAll
ApplicationCybozuDezie8.1.1AllAllAll
  • cpe:2.3:a:cybozu:dezie:8.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.0.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:cybozu:dezie:8.1.1:*:*:*:*:*:*:*: