{"containers":{"cna":{"affected":[{"product":"GroupSession","vendor":"Japan Total System Co.,Ltd.","versions":[{"status":"affected","version":"GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0"}]}],"descriptions":[{"lang":"en","value":"Server-side request forgery (SSRF) vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote authenticated attacker to conduct a port scan from the product and/or obtain information from the internal Web server."}],"problemTypes":[{"descriptions":[{"description":"Server-Side Request Forgery (SSRF)","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-07-28T00:45:31.000Z","orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://groupsession.jp/info/info-news/security202107"},{"tags":["x_refsource_MISC"],"url":"https://jvn.jp/en/jp/JVN86026700/index.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vultures@jpcert.or.jp","ID":"CVE-2021-20788","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"GroupSession","version":{"version_data":[{"version_value":"GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0"}]}}]},"vendor_name":"Japan Total System Co.,Ltd."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Server-side request forgery (SSRF) vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote authenticated attacker to conduct a port scan from the product and/or obtain information from the internal Web server."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Server-Side Request Forgery (SSRF)"}]}]},"references":{"reference_data":[{"name":"https://groupsession.jp/info/info-news/security202107","refsource":"MISC","url":"https://groupsession.jp/info/info-news/security202107"},{"name":"https://jvn.jp/en/jp/JVN86026700/index.html","refsource":"MISC","url":"https://jvn.jp/en/jp/JVN86026700/index.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:53:22.474Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://groupsession.jp/info/info-news/security202107"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://jvn.jp/en/jp/JVN86026700/index.html"}]}]},"cveMetadata":{"assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","assignerShortName":"jpcert","cveId":"CVE-2021-20788","datePublished":"2021-07-28T00:45:31.000Z","dateReserved":"2020-12-17T00:00:00.000Z","dateUpdated":"2024-08-03T17:53:22.474Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}