Directory traversal vulnerability in the logging implementation in Cybozu Garoon 3.7 through 4.2 allows remote authenticated users to read a log file via unspecified vectors.
                
            References
                    | Link | Resource | 
|---|---|
| http://jvn.jp/en/jp/JVN14749391/index.html | Vendor Advisory | 
| http://jvndb.jvn.jp/jvndb/JVNDB-2016-000095 | Vendor Advisory | 
| https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03 | Patch Vendor Advisory | 
| http://jvn.jp/en/jp/JVN14749391/index.html | Vendor Advisory | 
| http://jvndb.jvn.jp/jvndb/JVNDB-2016-000095 | Vendor Advisory | 
| https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03 | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://jvn.jp/en/jp/JVN14749391/index.html - Vendor Advisory | |
| References | () http://jvndb.jvn.jp/jvndb/JVNDB-2016-000095 - Vendor Advisory | |
| References | () https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03 - Patch, Vendor Advisory | 
Information
                Published : 2016-06-19 20:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-1192
Mitre link : CVE-2016-1192
CVE.ORG link : CVE-2016-1192
JSON object : View
Products Affected
                cybozu
- garoon
