Headline
CVE-2022-40199: JVN#21213852: Multiple vulnerabilities in EC-CUBE
Directory traversal vulnerability in EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p4 ) and EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.1.2) allows a remote authenticated attacker with an administrative privilege to obtain the product’s directory structure information.
Published:2022/09/15 Last Updated:2022/09/20
Overview
EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities.
Products Affected
CVE-2022-40199
- EC-CUBE 3.0.0 to 3.0.18-p4 (EC-CUBE 3 series)
- EC-CUBE 4.0.0 to 4.1.2 (EC-CUBE 4 series)
CVE-2022-38975
- EC-CUBE 4.0.0 to 4.1.2 (EC-CUBE 4 series)
Description
EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities listed below.
Directory traversal vulnerability (CWE-22) - CVE-2022-40199
CVSS v3
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Base Score: 2.7
CVSS v2
AV:N/AC:L/Au:S/C:P/I:N/A:N
Base Score: 4.0
DOM-based cross-site scripting vulnerability (CWE-79) - CVE-2022-38975
CVSS v3
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Base Score: 6.1
CVSS v2
AV:N/AC:H/Au:N/C:N/I:P/A:N
Base Score: 2.6
Impact
- A remote attacker who can log in to the product may obtain the product’s directory structure information - CVE-2022-40199
- If a remote attacker leads an administrator of the product to a specially crafted page and to perform a specific operation, an arbitrary script may be executed on the administrator’s web browser - CVE-2022-38975
Solution
Update the software
An update is available for EC-CUBE 4 series.
Update to the latest version according to the information provided by the developer.
For EC-CUBE 3 series, there is no update but a patch is available.
Apply the patch
Patches are available for both EC-CUBE 3 and EC-CUBE 4 series.
For more information, refer to the information provided by the developer.
Vendor Status
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Noriaki Iwasaki of Cyber Defense Institute, Inc. reported these vulnerabilities to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported them to JPCERT/CC to notify users of the solutions through JVN.
Other Information
Update History
2022/09/20
Information under the section [Credit] was updated.
2022/09/20
EC-CUBE CO.,LTD. update status