Some coordinated vulnerability disclosures in April 2016
Hello, Taki here. It has been a long time since I have written here.
Today, I will be writing about some activities within our Vulnerability Coordination Group.
Over the past few years, we have received some coordination requests directly from overseas researchers and other sources, in addition to the reports through the " Information Security Early Warning Partnership".
I would like to introduce some recent cases that we have published on Japan Vulnerability Notes (JVN - https://jvn.jp/) but due to system limitations, are not in English at the moment.
The first case is,
JVNVU#92116866 – Published on 2016/4/26
(https://jvn.jp/vu/JVNVU92116866/index.html)
Keitai Kit for Movable Type vulnerable to OS Command Injection.
An OS command injection vulnerability was reported to us in the Movable Type plugin, Keitai Kit. Leveraging this vulnerability may result in arbitrary OS commands being executed on the server.
Versions affected are 1.35 through 1.641.
Attacks in the wild leveraging this vulnerability have been confirmed.
The vendor has provided an updated version, 1.65 to address the vulnerability. For those that cannot update, emergency patches have been provided for affected versions.
This vulnerability has been assigned, CVE-2016-1204.
The second case is,
JVNVU#90405898 – Published on 2016/4/27
(https://jvn.jp/vu/JVNVU90405898/index.html)
ManageEngine Password Manager Pro fails to restrict access permissions.
An access permission bypass vulnerability was reported to us in ManageEngine Password Manager Pro. Leveraging this vulnerability may result in unauthorized users being able to access password entry records for other users.
Versions affected are 8.3.0 (Build 8303) and 8.4.0 (Build 8400, 8401, 8402).
The vendor has provided an update version, 8.4.0 (Build 8403) to address the vulnerability.
And this vulnerability has been assigned, CVE-2016-1159.
Internally, we are working to upgrade our systems so that we can get this information onto JVN in an advisory format. For the time being, I hope to update through this blog periodically on some of our coordinated disclosures.
If you have a vulnerability report and are having difficulty reaching a vendor or are trying to reach a Japanese vendor and having a language issue, feel free to contact us. While we may not always be successful, we can at least give it our best try to contact and coordinate with a vendor.
For coordination assistance, please contact us at vultures (at) jpcert (dot) or (dot) jp.
- Takayuki (Taki) Uchiyama