SB2013112101 - Multiple vulnerabilities in ec-cube.net EC-CUBE
Published: November 21, 2013 Updated: February 9, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Cross-site request forgery (CVE-ID: CVE-2013-5993)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
2) Information disclosure (CVE-ID: CVE-2013-5994)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
data/class/pages/mypage/LC_Page_Mypage_DeliveryAddr.php in LOCKON EC-CUBE 2.11.2 through 2.13.0 allows remote attackers to obtain sensitive information via a direct request, which reveals the full path in an error message.
3) Information disclosure (CVE-ID: CVE-2013-5995)
The vulnerability allows a remote #AU# to read and manipulate data.
data/class/helper/SC_Helper_Address.php in the front-features implementation in LOCKON EC-CUBE 2.12.3 through 2.13.0 allows remote authenticated users to obtain sensitive information via unspecified vectors related to addresses. Per: http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000106.html "User's information may be obtained or altered by other user who visits the shopping site"
4) Cross-site scripting (CVE-ID: CVE-2013-5996)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in shopping/payment.tpl components in LOCKON EC-CUBE 2.11.0 through 2.13.0 when processing crafted values. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install update from vendor's website.
References
- http://jvn.jp/en/jp/JVN11221613/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2013-000097
- http://svn.ec-cube.net/open_trac/changeset/23277
- http://www.ec-cube.net/info/weakness/weakness.php?id=53
- http://jvn.jp/en/jp/JVN06870202/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2013-000098
- http://svn.ec-cube.net/open_trac/changeset/23278
- http://www.ec-cube.net/info/weakness/weakness.php?id=52
- http://jvn.jp/en/jp/JVN55630933/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2013-000106
- http://svn.ec-cube.net/open_trac/changeset/23274
- http://www.ec-cube.net/info/weakness/weakness.php?id=51
- http://jvn.jp/en/jp/JVN06377589/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2013-000107
- http://svn.ec-cube.net/open_trac/changeset/23275
- http://www.ec-cube.net/info/weakness/weakness.php?id=55