Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-40199: JVN#21213852: Multiple vulnerabilities in EC-CUBE

Directory traversal vulnerability in EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p4 ) and EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.1.2) allows a remote authenticated attacker with an administrative privilege to obtain the product’s directory structure information.

CVE
#xss#vulnerability#web#auth

Published:2022/09/15 Last Updated:2022/09/20

Overview

EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities.

Products Affected

CVE-2022-40199

  • EC-CUBE 3.0.0 to 3.0.18-p4 (EC-CUBE 3 series)
  • EC-CUBE 4.0.0 to 4.1.2 (EC-CUBE 4 series)

CVE-2022-38975

  • EC-CUBE 4.0.0 to 4.1.2 (EC-CUBE 4 series)

Description

EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities listed below.

  • Directory traversal vulnerability (CWE-22) - CVE-2022-40199

    CVSS v3

    CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

    Base Score: 2.7

    CVSS v2

    AV:N/AC:L/Au:S/C:P/I:N/A:N

    Base Score: 4.0

  • DOM-based cross-site scripting vulnerability (CWE-79) - CVE-2022-38975

    CVSS v3

    CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

    Base Score: 6.1

    CVSS v2

    AV:N/AC:H/Au:N/C:N/I:P/A:N

    Base Score: 2.6

Impact

  • A remote attacker who can log in to the product may obtain the product’s directory structure information - CVE-2022-40199
  • If a remote attacker leads an administrator of the product to a specially crafted page and to perform a specific operation, an arbitrary script may be executed on the administrator’s web browser - CVE-2022-38975

Solution

Update the software
An update is available for EC-CUBE 4 series.
Update to the latest version according to the information provided by the developer.
For EC-CUBE 3 series, there is no update but a patch is available.

Apply the patch
Patches are available for both EC-CUBE 3 and EC-CUBE 4 series.
For more information, refer to the information provided by the developer.

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Noriaki Iwasaki of Cyber Defense Institute, Inc. reported these vulnerabilities to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported them to JPCERT/CC to notify users of the solutions through JVN.

Other Information

Update History

2022/09/20

Information under the section [Credit] was updated.

2022/09/20

EC-CUBE CO.,LTD. update status

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda