SB2013052903 - Multiple vulnerabilities in ec-cube.net EC-CUBE
Published: May 29, 2013 Updated: February 9, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2013-2312)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in the shopping-cart screen in LOCKON EC-CUBE 2.11.0 through 2.12.3enP2. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Improper Authentication (CVE-ID: CVE-2013-2313)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Session fixation vulnerability in LOCKON EC-CUBE 2.11.0 through 2.12.3enP2 allows remote attackers to hijack web sessions via unspecified vectors.
3) Cross-site scripting (CVE-ID: CVE-2013-2314)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in the adminAuthorization function in data/class/helper/SC_Helper_Session.php in LOCKON EC-CUBE 2.11.0 through 2.12.3enP2. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Input validation error (CVE-ID: CVE-2013-2315)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
data/class/pages/forgot/LC_Page_Forgot.php in LOCKON EC-CUBE 2.11.0 through 2.12.3enP2 does not properly validate the input to the password reminder function, which allows remote attackers to obtain sensitive information via a crafted request.
Remediation
Install update from vendor's website.
References
- http://jvn.jp/en/jp/JVN52552792/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2013-000041
- http://svn.ec-cube.net/open_trac/changeset/22604
- http://www.ec-cube.net/info/weakness/weakness.php?id=40
- http://jvn.jp/en/jp/JVN00985872/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2013-000042
- http://svn.ec-cube.net/open_trac/changeset/22804
- http://svn.ec-cube.net/open_trac/changeset/22805
- http://jvn.jp/en/jp/JVN45306814/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2013-000043
- http://svn.ec-cube.net/open_trac/changeset/22826
- http://www.ec-cube.net/info/weakness/weakness.php?id=42
- http://jvn.jp/en/jp/JVN39699406/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2013-000044
- http://svn.ec-cube.net/open_trac/changeset/22580
- http://www.ec-cube.net/info/weakness/weakness.php?id=43