Refine your search

3 vulnerabilities found for WebProxy by LunarNight Laboratory

jvndb-2024-000904
Vulnerability from jvndb
Published
2024-03-26 14:19
Modified
2024-03-26 14:19
Severity ?
Summary
WebProxy vulnerable to OS command injection
Details
WebProxy <http://www.ln-lab.net/> provided by LunarNight Laboratory (according to the original report submitted by the reporter) is software to build a proxy server. WebProxy contains an OS command injection vulnerability (CWE-78). During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied. 1. The developer of the product is unreachable 2. Existence of vulnerability has been verified 3. Not disclosing this case may result in the risk that product users will have no means to know 4. There are no particular reasons that would make disclosure inappropriate
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000904.html",
  "dc:date": "2024-03-26T14:19+09:00",
  "dcterms:issued": "2024-03-26T14:19+09:00",
  "dcterms:modified": "2024-03-26T14:19+09:00",
  "description": "WebProxy \u0026lt;http://www.ln-lab.net/\u0026gt; provided by LunarNight Laboratory (according to the original report submitted by the reporter) is software to build a proxy server. WebProxy contains an OS command injection vulnerability (CWE-78).\r\n\r\nDuring the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied.\r\n\r\n1. The developer of the product is unreachable\r\n2. Existence of vulnerability has been verified\r\n3. Not disclosing this case may result in the risk that product users will have no means to know\r\n4. There are no particular reasons that would make disclosure inappropriate",
  "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000904.html",
  "sec:cpe": {
    "#text": "cpe:/a:ln-lab:webproxy",
    "@product": "WebProxy",
    "@vendor": "LunarNight Laboratory",
    "@version": "2.2"
  },
  "sec:cvss": [
    {
      "@score": "6.8",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "@version": "2.0"
    },
    {
      "@score": "7.3",
      "@severity": "High",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2024-000904",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN22376992/index.html",
      "@id": "JVN#22376992",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-28033",
      "@id": "CVE-2024-28033",
      "@source": "CVE"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-78",
      "@title": "OS Command Injection(CWE-78)"
    }
  ],
  "title": "WebProxy vulnerable to OS command injection"
}

jvndb-2018-000908
Vulnerability from jvndb
Published
2018-03-13 16:48
Modified
2018-06-14 13:51
Severity ?
Summary
WebProxy vulnerable to directory traversal
Details
WebProxy provided by LunarNight Laboratory is software for creating a proxy server. WebProxy contains a directory traversal vulnerability (CWE-22) due to a flaw in processing certain requests. During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 5, 2017, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Others and Information Security Early Warning Partnership Guideline have been satisfied. 1. The developer of the product is unreachable 2. Existence of vulnerability has been verified 3. Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product 4. There are no particular reasons that would make disclosure inappropriate
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000908.html",
  "dc:date": "2018-06-14T13:51+09:00",
  "dcterms:issued": "2018-03-13T16:48+09:00",
  "dcterms:modified": "2018-06-14T13:51+09:00",
  "description": "WebProxy provided by LunarNight Laboratory is software for creating a proxy server. WebProxy contains a directory traversal vulnerability (CWE-22) due to a flaw in processing certain requests.\r\n\r\nDuring the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 5, 2017, it was judged that an advisory for this vulnerability  shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Others and Information Security Early Warning Partnership Guideline have been satisfied.\r\n\r\n1. The developer of the product is unreachable\r\n2. Existence of vulnerability has been verified\r\n3. Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product\r\n4. There are no particular reasons that would make disclosure inappropriate",
  "link": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000908.html",
  "sec:cpe": {
    "#text": "cpe:/a:ln-lab:webproxy",
    "@product": "WebProxy",
    "@vendor": "LunarNight Laboratory",
    "@version": "2.2"
  },
  "sec:cvss": [
    {
      "@score": "7.5",
      "@severity": "High",
      "@type": "Base",
      "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "@version": "2.0"
    },
    {
      "@score": "7.3",
      "@severity": "High",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2018-000908",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN87226910/index.html",
      "@id": "JVN#87226910",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0542",
      "@id": "CVE-2018-0542",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2018-0542",
      "@id": "CVE-2018-0542",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-22",
      "@title": "Path Traversal(CWE-22)"
    }
  ],
  "title": "WebProxy vulnerable to directory traversal"
}

jvndb-2008-000041
Vulnerability from jvndb
Published
2008-07-24 14:23
Modified
2008-07-24 14:23
Severity ?
() - -
Summary
WebProxy from LunarNight Laboratory vulnerable to cross-site scripting
Details
WebProxy provided by LunarNight Laboratory contains a cross-site scripting vulnerability. WebProxy is a perl script for web proxy provided by LunarNight Laboratory. WebProxy contains a cross-site scripting vulnerability. Shuya Ueki reported this vulnerability to IPA. JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000041.html",
  "dc:date": "2008-07-24T14:23+09:00",
  "dcterms:issued": "2008-07-24T14:23+09:00",
  "dcterms:modified": "2008-07-24T14:23+09:00",
  "description": "WebProxy provided by LunarNight Laboratory contains a cross-site scripting vulnerability.\r\n\r\nWebProxy is a perl script for web proxy provided by LunarNight Laboratory. WebProxy contains a cross-site scripting vulnerability.\r\n\r\nShuya Ueki reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000041.html",
  "sec:cpe": {
    "#text": "cpe:/a:ln-lab:webproxy",
    "@product": "WebProxy",
    "@vendor": "LunarNight Laboratory",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "4.3",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2008-000041",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN49704543/index.html",
      "@id": "JVN#49704543",
      "@source": "JVN"
    },
    {
      "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3255",
      "@id": "CVE-2008-3255",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3255",
      "@id": "CVE-2008-3255",
      "@source": "NVD"
    },
    {
      "#text": "http://secunia.com/advisories/31042",
      "@id": "SA31042",
      "@source": "SECUNIA"
    },
    {
      "#text": "http://www.securityfocus.com/bid/30283",
      "@id": "30283",
      "@source": "BID"
    },
    {
      "#text": "http://xforce.iss.net/xforce/xfdb/43879",
      "@id": "43879",
      "@source": "XF"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-79",
      "@title": "Cross-site Scripting(CWE-79)"
    }
  ],
  "title": "WebProxy from LunarNight Laboratory vulnerable to cross-site scripting"
}