CVE-2020-5555

9.1 CRITICAL

📋 TL;DR

This vulnerability in Shihonkanri Plus GOOUT allows remote attackers to read and write files in the same directory as the software due to improper input validation. It affects users of versions 1.5.8 and 2.2.10, potentially leading to data exposure or manipulation.

💻 Affected Systems

Products:
  • Shihonkanri Plus GOOUT
Versions: Ver1.5.8 and Ver2.2.10
Operating Systems: Not specified, likely Windows or Linux based on typical deployment
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability arises from improper input validation, affecting files in the same directory as the software installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive files (e.g., configuration, credentials) or write malicious files, leading to data breaches, system compromise, or ransomware deployment.

🟠

Likely Case

Unauthorized access to files in the application directory, resulting in data leakage or modification of application data.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the application's directory, reducing broader system risk.

🌐 Internet-Facing: HIGH, as remote attackers can exploit it without authentication, making internet-exposed instances particularly vulnerable.
🏢 Internal Only: MEDIUM, as internal attackers could still exploit it, but network controls may reduce exposure compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW, as it involves unspecified vectors but likely simple due to input validation flaws.

Exploitation details are unspecified in references, but the high CVSS score suggests it may be straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references; check vendor for updates beyond Ver1.5.8 and Ver2.2.10.

Vendor Advisory: https://jvn.jp/en/jp/JVN32415420/index.html

Restart Required: Yes

Instructions:

1. Check vendor website for patches or updated versions. 2. Apply the patch or upgrade to a fixed version. 3. Restart the application or server as required.

🔧 Temporary Workarounds

Restrict File Permissions

all

Limit read/write permissions on the application directory to necessary users only.

chmod 750 /path/to/application (Linux)
icacls "C:\path\to\application" /deny Everyone:(R,W) (Windows)

Network Segmentation

all

Isolate the application from untrusted networks using firewalls or VLANs.

🧯 If You Can't Patch

  • Disable or remove the application if not essential to reduce attack surface.
  • Implement strict access controls and monitor for unusual file access patterns.

🔍 How to Verify

Check if Vulnerable:

Check the application version; if it is Ver1.5.8 or Ver2.2.10, it is vulnerable.

Check Version:

Check application documentation or configuration files for version info; no standard command provided.

Verify Fix Applied:

Verify the version has been updated to a patched release and test file access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file read/write events in application logs
  • Access attempts from unknown IP addresses

Network Indicators:

  • Suspicious HTTP requests to application endpoints
  • Unexpected file transfers

SIEM Query:

Example: 'source="application_logs" AND (event="file_access" OR event="input_validation_failure")'

🔗 References

📤 Share & Export