User Manual

08.13.2024

MANUAL

Cross-site Scripting and Directory Traversal Vulnerabilities in Pleasanter

Release date June 22, 2023<br> <br> <h3>■Overview</h3> It has been discovered that all versions of our product "Pleasanter" are vulnerable to cross-site scripting and directory traversal. If this vulnerability is exploited, there is a risk that malicious third parties may redirect users to external fraudulent sites or leak or tamper with data registered in Pleasanter.<br> The versions of Pleasanter affected by this issue are listed below. Please take the measures listed in the countermeasures.<br> <br> <h3>■How to check the affected version</h3> The affected versions are as follows:<br> ・All versions prior to 1.3.39.2<br>  *This applies to both Community Edition and Enterprise Edition.<br>  *This also applies to versions 1.2, 1.1, 0.51, 0.50, 0.49 and earlier.<br> ・Please, refer to the following user manual for how to check the version.<br>  「<a href="https://pleasanter.org/manual/faq-version">FAQ: I want to check the version of Pleasanter</a>」<br> <br> <h3>■Vulnerability description</h3> When a logged-in general user pastes an image in the content, explanation item, comment, etc., or attaches a file to the attachment item, the request is fraudulently altered to lead to an external site or script provided by Pleasanter. A vulnerability allows the user to execute, and upload files to unexpected folders. Anonymous users who cannot log in to Pleasanter cannot perform attacks using this vulnerability.<br> <br> <h3>■Threat posed by vulnerabilities</h3> The script installed by the attacker may lead to malicious external sites, or if the administrator of Pleasanter opens a page where the attacker installed the script, it may unintentionally cause the administrator of Pleasanter to execute administrative operations on Pleasanter. Files may also be saved to unexpected folders.<br> <br> <h3>■Countermeasure</h3> ・For customers using versions 1.3.X, 1.2.X, 1.1.X, 0.51.X, 0.50.X, 0.49.X or earlier<br>  Please upgrade to the latest version, 1.3.40.0 or later (released June 6, 2023), which contains the fix.<br>  * Individual patches will not be provided to address the issue without upgrading.<br> ・For customers using a dedicated environment<br>  We will update the version as soon as possible after adjusting the schedule separately.(Restart is required.)<br> <br> <h3>■Change log</h3> 2023.6.22 This vulnerability has been made public.<br> <br> <h3>■Contact information</h3> If you have any questions, Please contact us via the form below.<br> Inquiry form<br> <a href="https://pleasanter.org/contact/">https://pleasanter.org/contact/</a><br>
TOP
このページをシェアする
記載された商品名、各製品名は各社の登録商標または商標です。 © Implem Inc.