Update: February 17, 2017
A cross-site scripting vulnerability was found in uCosminexus Portal Framework, Groupmax Collaboration, Hitachi Navigation Platform and JP1/Navigation Platform.
Security Information ID
hitachi-sec-2017-104
Vulnerability description
A cross-site scripting vulnerability was found in uCosminexus Portal Framework, Groupmax Collaboration, Hitachi Navigation Platform and JP1/Navigation Platform.
Remote users can exploit this vulnerability to execute malicious scripts.
Affected products and versions are listed below. Please upgrade your version to the appropriate version.
Affected products
The information is organized under the following headings:
(Example)
Product name: Gives the name of the affected product.
Version:
- Platform
- Gives the affected version.
Product name: uCosminexus Portal Framework
Version(s):
- Windows
- 09-00 to 09-03, 08-00 to 08-70-/F, 07-00 to 07-60-/I, 06-00 to 06-30-/D
- Linux
- 09-00 to 09-03, 08-02 to 08-70-/F, 07-60 to 07-60-/I
Product name: uCosminexus Portal Framework - Light
Version(s):
- Windows
- 08-00 to 08-70-/F, 07-00 to 07-60-/I, 06-00 to 06-30-/D
Product name: Groupmax Collaboration Portal
Version(s):
- Windows
- 07-32 to 07-91-/D
Product name: uCosminexus Collaboration Portal
Version(s):
- Windows
- 06-20 to 06-87-/C
Product name: Groupmax Collaboration Web Client - Forum/File Sharing
Version(s):
- Windows
- 07-00 to 07-91-/B
Product name: uCosminexus Collaboration Portal - Forum/File Sharing
Version(s):
- Windows
- 06-20 to 06-87-/C
Product name: Groupmax Collaboration Web Client - Mail/Schedule
Version(s):
- Windows
- 07-20 to 07-91-/D
Product name: Hitachi Navigation Platform
Version(s):
- Windows
- 10-10 to 10-10-01, 10-00 to 10-00-01
Product name: Hitachi Navigation Platform for Developers
Version(s):
- Windows
- 10-10 to 10-10-01, 10-00 to 10-00-01
Product name: JP1/Navigation Platform
Version(s):
- Windows
- 11-00 to 11-00-01
Product name: JP1/Navigation Platform for Developers
Version(s):
- Windows
- 11-00 to 11-00-01
Product name: JP1/Integrated Management - Navigation Platform
Version(s):
- Windows
- 10-00 to 10-50-01, 09-50
Product name: uCosminexus Navigation Platform
Version(s):
- Windows
- 09-00 to 09-60-/A, 08-00 to 08-70-/C
Product name: uCosminexus Navigation Developer
Version(s):
- Windows
- 09-00 to 09-60-/A, 08-00 to 08-70-/C
Product name: uCosminexus Navigation Platform - User License
Version(s):
- Windows
- 09-00 to 09-60-/A, 08-00 to 08-70-/C
Product name: uCosminexus Navigation Platform - Authoring License
Version(s):
- Windows
- 09-00 to 09-60-/A, 08-00 to 08-70-/C
Fixed products
The information is organized under the following headings:
(Example)
Product name: Gives the name of the fixed product.
Version:
- Platform
- Gives the fixed version, and release date.
Scheduled version:
- Platform
- Gives the fixed version scheduled to be released.
Product name: uCosminexus Portal Framework
Version(s):
- Windows
- 09-03-/A January 27, 2017
- 09-00-/C January 27, 2017
- 08-70-/G January 27, 2017
- Linux
- 09-03-/A January 27, 2017
- 08-70-/G January 27, 2017
Product name: uCosminexus Portal Framework - Light
Version(s):
- Windows
- 08-70-/G January 27, 2017
Product name: Groupmax Collaboration Portal
Version(s):
- Windows
- 07-91-/E January 30, 2017
- 07-87-/H January 30, 2017
Product name: Groupmax Collaboration Web Client - Forum/File Sharing
Version(s):
- Windows
- 07-91-/C January 30, 2017
- 07-87-/G January 30, 2017
Product name: Groupmax Collaboration Web Client - Mail/Schedule
Version(s):
- Windows
- 07-91-/E January 30, 2017
- 07-87-/H January 30, 2017
Product name: Hitachi Navigation Platform
Version(s):
- Windows
- 10-11 October 31, 2016
Product name: Hitachi Navigation Platform for Developers
Version(s):
- Windows
- 10-11 October 31, 2016
Product name: JP1/Navigation Platform
Version(s):
- Windows
- 11-01 October 31, 2016
Product name: JP1/Navigation Platform for Developers
Version(s):
- Windows
- 11-01 October 31, 2016
For details on the fixed products, contact your Hitachi support service representative.
Revision history
- February 17, 2017
- This page is released.
- Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
- The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
- The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
- The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.