Joruri Mail 2.1.4 and earlier does not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and alter/disclose the information via unspecified vectors.
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Link | Tags |
---|---|
https://joruri.org/docs/2018060400041/ | vendor advisory |
https://jvn.jp/en/jp/JVN58052567/index.html | third party advisory |