All the vulnerabilites related to EC-CUBE CO.,LTD. - EC-CUBE
jvndb-2018-000035
Vulnerability from jvndb
Published
2018-04-17 13:39
Modified
2018-08-22 17:42
Severity ?
Summary
EC-CUBE vulnerable to session fixation
Details
EC-CUBE provided by LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a session fixation vulnerability (CWE-384).
LOCKON CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and LOCKON CO.,LTD. coordinated under the Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000035.html", "dc:date": "2018-08-22T17:42+09:00", "dcterms:issued": "2018-04-17T13:39+09:00", "dcterms:modified": "2018-08-22T17:42+09:00", "description": "EC-CUBE provided by LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a session fixation vulnerability (CWE-384).\r\n\r\nLOCKON CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and LOCKON CO.,LTD. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000035.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "5.8", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "@version": "2.0" }, { "@score": "4.2", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2018-000035", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN52695336/index.html", "@id": "JVN#52695336", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0564", "@id": "CVE-2018-0564", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2018-0564", "@id": "CVE-2018-0564", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "EC-CUBE vulnerable to session fixation" }
jvndb-2020-000039
Vulnerability from jvndb
Published
2020-06-18 13:48
Modified
2020-06-18 13:48
Severity ?
Summary
EC-CUBE vulnerable to directory traversal
Details
EC-CUBE provided by EC-CUBE CO.,LTD. contains a directory traversal vulnerability (CWE-22).
EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-000039.html", "dc:date": "2020-06-18T13:48+09:00", "dcterms:issued": "2020-06-18T13:48+09:00", "dcterms:modified": "2020-06-18T13:48+09:00", "description": "EC-CUBE provided by EC-CUBE CO.,LTD. contains a directory traversal vulnerability (CWE-22).\r\n\r\nEC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.\r\nJPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-000039.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "3.5", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2020-000039", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN77458946/index.html", "@id": "JVN#77458946", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5590", "@id": "CVE-2020-5590", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2020-5590", "@id": "CVE-2020-5590", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" } ], "title": "EC-CUBE vulnerable to directory traversal" }
jvndb-2015-000166
Vulnerability from jvndb
Published
2015-10-26 12:27
Modified
2015-11-13 19:36
Summary
EC-CUBE vulnerable to cross-site request forgery
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site request forgery vulnerability (CWE-352).
Gen Sato of TRADE WORKS Co.,Ltd. Security Dept. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN97278546/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5665 | |
NVD | https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5665 | |
Cross-Site Request Forgery(CWE-352) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000166.html", "dc:date": "2015-11-13T19:36+09:00", "dcterms:issued": "2015-10-26T12:27+09:00", "dcterms:modified": "2015-11-13T19:36+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site request forgery vulnerability (CWE-352).\r\n\r\nGen Sato of TRADE WORKS Co.,Ltd. Security Dept. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000166.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.1", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2015-000166", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN97278546/index.html", "@id": "JVN#97278546", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5665", "@id": "CVE-2015-5665", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5665", "@id": "CVE-2015-5665", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" } ], "title": "EC-CUBE vulnerable to cross-site request forgery" }
jvndb-2009-000078
Vulnerability from jvndb
Published
2009-12-07 14:51
Modified
2009-12-07 14:51
Summary
EC-CUBE information disclosure vulnerability
Details
EC-CUBE from LOCKON CO.,LTD. contains an information disclosure vulnerability.
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an information disclosure vulnerability.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000078.html", "dc:date": "2009-12-07T14:51+09:00", "dcterms:issued": "2009-12-07T14:51+09:00", "dcterms:modified": "2009-12-07T14:51+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. contains an information disclosure vulnerability. \r\n\r\nEC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an information disclosure vulnerability.", "link": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000078.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2009-000078", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN79762947/index.html", "@id": "JVN#79762947", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4236", "@id": "CVE-2009-4236", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4236", "@id": "CVE-2009-4236", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/english/vuln/200912_ec-cube_en.html", "@id": "Security Alert for EC-CUBE Vulnerability", "@source": "IPA SECURITY ALERTS" }, { "#text": "http://secunia.com/advisories/37603", "@id": "SA37603", "@source": "SECUNIA" }, { "#text": "http://xforce.iss.net/xforce/xfdb/54573", "@id": "54573", "@source": "XF" }, { "#text": "http://www.vupen.com/english/advisories/2009/3421", "@id": "VUPEN/ADV-2009-3421", "@source": "VUPEN" }, { "#text": "http://osvdb.org/60685", "@id": "60685", "@source": "OSVDB" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-200", "@title": "Information Exposure(CWE-200)" } ], "title": "EC-CUBE information disclosure vulnerability" }
jvndb-2018-000127
Vulnerability from jvndb
Published
2018-11-28 17:24
Modified
2019-08-28 09:42
Severity ?
Summary
EC-CUBE vulnerable to open redirect
Details
EC-CUBE provided by LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an open redirect vulnerability (CWE-601).
LOCKON CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and LOCKON CO.,LTD. coordinated under the Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN25359688/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16191 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2018-16191 | |
Improper Input Validation(CWE-20) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000127.html", "dc:date": "2019-08-28T09:42+09:00", "dcterms:issued": "2018-11-28T17:24+09:00", "dcterms:modified": "2019-08-28T09:42+09:00", "description": "EC-CUBE provided by LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an open redirect vulnerability (CWE-601).\r\n\r\nLOCKON CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and LOCKON CO.,LTD. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000127.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.7", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2018-000127", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN25359688/index.html", "@id": "JVN#25359688", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16191", "@id": "CVE-2018-16191", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2018-16191", "@id": "CVE-2018-16191", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-20", "@title": "Improper Input Validation(CWE-20)" } ], "title": "EC-CUBE vulnerable to open redirect" }
jvndb-2020-000080
Vulnerability from jvndb
Published
2020-12-03 18:15
Modified
2020-12-03 18:15
Severity ?
Summary
Multiple vulnerabilities in EC-CUBE
Details
EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities listed below.
* Clickjacking attacks (CWE-1021) - CVE-2020-5679
* Improper input validation (CWE-20) - CVE-2020-5680
EC-CUBE CO.,LTD. reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-000080.html", "dc:date": "2020-12-03T18:15+09:00", "dcterms:issued": "2020-12-03T18:15+09:00", "dcterms:modified": "2020-12-03T18:15+09:00", "description": "EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities listed below.\r\n* Clickjacking attacks (CWE-1021) - CVE-2020-5679\r\n* Improper input validation (CWE-20) - CVE-2020-5680\r\n\r\nEC-CUBE CO.,LTD. reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-000080.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0" }, { "@score": "5.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "@version": "3.0" } ], "sec:identifier": "JVNDB-2020-000080", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN24457594/index.html", "@id": "JVN#24457594", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5679", "@id": "CVE-2020-5679", "@source": "CVE" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5680", "@id": "CVE-2020-5680", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2020-5679", "@id": "CVE-2020-5679", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2020-5680", "@id": "CVE-2020-5680", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-20", "@title": "Improper Input Validation(CWE-20)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "Multiple vulnerabilities in EC-CUBE" }
jvndb-2013-000041
Vulnerability from jvndb
Published
2013-05-23 14:11
Modified
2013-05-23 14:11
Summary
EC-CUBE vulnerable to cross-site scripting
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a vulnerability in handling the output of parameters, which may result in cross-site scripting.
Yuji Tounai of bogus.jp reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000041.html", "dc:date": "2013-05-23T14:11+09:00", "dcterms:issued": "2013-05-23T14:11+09:00", "dcterms:modified": "2013-05-23T14:11+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a vulnerability in handling the output of parameters, which may result in cross-site scripting.\r\n\r\nYuji Tounai of bogus.jp reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000041.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000041", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN52552792/index.html", "@id": "JVN#52552792", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2312", "@id": "CVE-2013-2312", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2312", "@id": "CVE-2013-2312", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE vulnerable to cross-site scripting" }
jvndb-2013-000042
Vulnerability from jvndb
Published
2013-05-23 14:15
Modified
2013-05-23 14:15
Summary
EC-CUBE vulnerable to session fixation
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a session fixation vulnerability.
Yuji Tounai of bogus.jp reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000042.html", "dc:date": "2013-05-23T14:15+09:00", "dcterms:issued": "2013-05-23T14:15+09:00", "dcterms:modified": "2013-05-23T14:15+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a session fixation vulnerability.\r\n\r\nYuji Tounai of bogus.jp reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000042.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "4.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000042", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN00985872/index.html", "@id": "JVN#00985872", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2313", "@id": "CVE-2013-2313", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2313", "@id": "CVE-2013-2313", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-264", "@title": "Permissions(CWE-264)" } ], "title": "EC-CUBE vulnerable to session fixation" }
jvndb-2011-000087
Vulnerability from jvndb
Published
2011-10-14 17:53
Modified
2011-10-14 17:53
Summary
EC-CUBE vulnerable to SQL injection
Details
EC-CUBE contains a SQL injection vulnerability.
EC-CUBE provided by LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an issue in assembling SQL statements, leading to a SQL injection vulnerability.
This vulnerability is different from JVN#81111541 and JVN#19072922.
Tsukada Nobuhisa of Seasoft reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000087.html", "dc:date": "2011-10-14T17:53+09:00", "dcterms:issued": "2011-10-14T17:53+09:00", "dcterms:modified": "2011-10-14T17:53+09:00", "description": "EC-CUBE contains a SQL injection vulnerability.\r\n\r\nEC-CUBE provided by LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an issue in assembling SQL statements, leading to a SQL injection vulnerability.\r\nThis vulnerability is different from JVN#81111541 and JVN#19072922.\r\n\r\nTsukada Nobuhisa of Seasoft reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000087.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000087", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN44496332/index.html", "@id": "JVN#44496332", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3988", "@id": "CVE-2011-3988", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3988", "@id": "CVE-2011-3988", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/english/vuln/201110_eccube_en.html", "@id": "Security Alert for Vulnerability in EC-CUBE", "@source": "IPA SECURITY ALERTS" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-89", "@title": "SQL Injection(CWE-89)" } ], "title": "EC-CUBE vulnerable to SQL injection" }
jvndb-2006-000781
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 00:00
Summary
EC-CUBE cross-site scripting vulnerability
Details
EC-CUBE, an open source system for creating shopping websites, contains a cross-site scripting vulnerability.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2006/JVNDB-2006-000781.html", "dc:date": "2008-05-21T00:00+09:00", "dcterms:issued": "2008-05-21T00:00+09:00", "dcterms:modified": "2008-05-21T00:00+09:00", "description": "EC-CUBE, an open source system for creating shopping websites, contains a cross-site scripting vulnerability.", "link": "https://jvndb.jvn.jp/en/contents/2006/JVNDB-2006-000781.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2006-000781", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN61543834/index.html", "@id": "JVN#61543834", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6108", "@id": "CVE-2006-6108", "@source": "CVE" }, { "#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-6108", "@id": "CVE-2006-6108", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/vuln/documents/2009/200907_ec-cube.html", "@id": "200907_ec-cube", "@source": "IPA SECURITY ALERTS" }, { "#text": "http://secunia.com/advisories/22925", "@id": "SA22925", "@source": "SECUNIA" }, { "#text": "http://www.securityfocus.com/bid/21146", "@id": "21146", "@source": "BID" }, { "#text": "http://xforce.iss.net/xforce/xfdb/30526", "@id": "30526", "@source": "XF" }, { "#text": "http://securitytracker.com/id?1017277", "@id": "1017277", "@source": "SECTRACK" }, { "#text": "http://www.frsirt.com/english/advisories/2006/4583", "@id": "FrSIRT/ADV-2006-4583", "@source": "FRSIRT" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE cross-site scripting vulnerability" }
jvndb-2008-000062
Vulnerability from jvndb
Published
2008-10-01 16:32
Modified
2008-10-01 16:32
Summary
EC-CUBE cross-site scripting vulnerability
Details
EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site scripting vulnerability.
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.
This vulnerability is different from JVN#61543834, JVN#36085487, and JVN#99916563.
Masako Oono of NetAgent Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000062.html", "dc:date": "2008-10-01T16:32+09:00", "dcterms:issued": "2008-10-01T16:32+09:00", "dcterms:modified": "2008-10-01T16:32+09:00", "description": "EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site scripting vulnerability.\r\n\r\nEC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.\r\nThis vulnerability is different from JVN#61543834, JVN#36085487, and JVN#99916563.\r\n\r\nMasako Oono of NetAgent Co., Ltd. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000062.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2008-000062", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN26621646/index.html", "@id": "JVN#26621646", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4537", "@id": "CVE-2008-4537", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4537", "@id": "CVE-2008-4537", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/vuln/documents/2009/200907_ec-cube.html", "@id": "200907_ec-cube", "@source": "IPA SECURITY ALERTS" }, { "#text": "http://secunia.com/advisories/32065", "@id": "SA32065", "@source": "SECUNIA" }, { "#text": "http://secunia.com/advisories/32065", "@id": "SA32065", "@source": "SECUNIA" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000062.html", "@id": "JVNDB-2008-000062", "@source": "JVNDB_Ja" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE cross-site scripting vulnerability" }
jvndb-2013-000043
Vulnerability from jvndb
Published
2013-05-23 15:42
Modified
2013-06-03 16:13
Summary
EC-CUBE fails to restrict access permissions
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a URL handling issue in certain environments and as a result, access permissions are not restricted.
Gen Sato reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000043.html", "dc:date": "2013-06-03T16:13+09:00", "dcterms:issued": "2013-05-23T15:42+09:00", "dcterms:modified": "2013-06-03T16:13+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a URL handling issue in certain environments and as a result, access permissions are not restricted.\r\n\r\nGen Sato reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000043.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "6.4", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000043", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN45306814/index.html", "@id": "JVN#45306814", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2314", "@id": "CVE-2013-2314", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2314", "@id": "CVE-2013-2314", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/ciadr/vul/20130523-jvn.html", "@id": "Security Updates Available for EC-CUBE (JVN#45306814)", "@source": "IPA SECURITY ALERTS" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-264", "@title": "Permissions(CWE-264)" } ], "title": "EC-CUBE fails to restrict access permissions" }
jvndb-2013-000104
Vulnerability from jvndb
Published
2013-11-20 15:19
Modified
2013-11-22 14:42
Summary
EC-CUBE vulnerable to information disclosure
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a vulnerability in processing the output of error logs, which may lead to information disclosure.
Gen Sato reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000104.html", "dc:date": "2013-11-22T14:42+09:00", "dcterms:issued": "2013-11-20T15:19+09:00", "dcterms:modified": "2013-11-22T14:42+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a vulnerability in processing the output of error logs, which may lead to information disclosure.\r\n\r\nGen Sato reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000104.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000104", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN61077110/index.html", "@id": "JVN#61077110", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5991", "@id": "CVE-2013-5991", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5991", "@id": "CVE-2013-5991", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-200", "@title": "Information Exposure(CWE-200)" } ], "title": "EC-CUBE vulnerable to information disclosure" }
jvndb-2008-000064
Vulnerability from jvndb
Published
2008-10-01 16:31
Modified
2008-10-01 16:31
Summary
EC-CUBE cross-site scripting vulnerability
Details
EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site scripting vulnerability.
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.
This vulnerability is different from JVN#61543834, JVN#26621646, and JVN#36085487.
Yuya Yoshida of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000064.html", "dc:date": "2008-10-01T16:31+09:00", "dcterms:issued": "2008-10-01T16:31+09:00", "dcterms:modified": "2008-10-01T16:31+09:00", "description": "EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site scripting vulnerability.\r\n\r\nEC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.\r\nThis vulnerability is different from JVN#61543834, JVN#26621646, and JVN#36085487. \r\n\r\nYuya Yoshida of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000064.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2008-000064", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN99916563/index.html", "@id": "JVN#99916563", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4535", "@id": "CVE-2008-4535", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4535", "@id": "CVE-2008-4535", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/vuln/documents/2009/200907_ec-cube.html", "@id": "200907_ec-cube", "@source": "IPA SECURITY ALERTS" }, { "#text": "http://secunia.com/advisories/32065", "@id": "SA32065", "@source": "SECUNIA" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000064.html", "@id": "JVNDB-2008-000064", "@source": "JVNDB_Ja" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE cross-site scripting vulnerability" }
jvndb-2013-000061
Vulnerability from jvndb
Published
2013-06-27 14:29
Modified
2013-07-02 15:57
Summary
EC-CUBE vulnerable to directory traversal
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a directory traversal vulnerability.
Note that this vulnerability is different from JVN#04161229.
Gen Sato reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000061.html", "dc:date": "2013-07-02T15:57+09:00", "dcterms:issued": "2013-06-27T14:29+09:00", "dcterms:modified": "2013-07-02T15:57+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a directory traversal vulnerability.\r\n\r\nNote that this vulnerability is different from JVN#04161229.\r\n\r\nGen Sato reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000061.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000061", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN43886811/index.html", "@id": "JVN#43886811", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3650", "@id": "CVE-2013-3650", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3650", "@id": "CVE-2013-3650", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" } ], "title": "EC-CUBE vulnerable to directory traversal" }
jvndb-2021-000035
Vulnerability from jvndb
Published
2021-05-10 18:08
Modified
2021-05-10 18:08
Severity ?
Summary
EC-CUBE vulnerable to cross-site scripting
Details
EC-CUBE provided by EC-CUBE CO.,LTD. contains a cross-site scripting vulnerability (CWE-79).
An arbitrary script may be executed by executing a specific operation on the management page of EC-CUBE.
As of 2021 May 10, an attack exploting this vulnerability has been observed in the wild.
EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN97554111/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20717 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2021-20717 | |
IPA SECURITY ALERTS | https://www.ipa.go.jp/security/ciadr/vul/20210510-jvn.html | |
JPCERT | https://www.jpcert.or.jp/english/at/2021/at210022.html | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000035.html", "dc:date": "2021-05-10T18:08+09:00", "dcterms:issued": "2021-05-10T18:08+09:00", "dcterms:modified": "2021-05-10T18:08+09:00", "description": "EC-CUBE provided by EC-CUBE CO.,LTD. contains a cross-site scripting vulnerability (CWE-79).\r\nAn arbitrary script may be executed by executing a specific operation on the management page of EC-CUBE.\r\n\r\nAs of 2021 May 10, an attack exploting this vulnerability has been observed in the wild.\r\n\r\nEC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000035.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "@version": "2.0" }, { "@score": "7.1", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "@version": "3.0" } ], "sec:identifier": "JVNDB-2021-000035", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN97554111/index.html", "@id": "JVN#97554111", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20717", "@id": "CVE-2021-20717", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20717", "@id": "CVE-2021-20717", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/security/ciadr/vul/20210510-jvn.html", "@id": "Regarding cross-site scripting vulnerability in EC-CUBE (JVN#97554111)", "@source": "IPA SECURITY ALERTS" }, { "#text": "https://www.jpcert.or.jp/english/at/2021/at210022.html", "@id": "Alert Regarding Cross Site Scripting Vulnerability (CVE-2021-20717) in EC-CUBE", "@source": "JPCERT" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE vulnerable to cross-site scripting" }
jvndb-2022-000015
Vulnerability from jvndb
Published
2022-02-22 14:22
Modified
2024-06-21 17:39
Severity ?
Summary
EC-CUBE improperly handles HTTP Host header values
Details
EC-CUBE provided by EC-CUBE CO.,LTD. improperly handles HTTP Host header values (CWE-913).
EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000015.html", "dc:date": "2024-06-21T17:39+09:00", "dcterms:issued": "2022-02-22T14:22+09:00", "dcterms:modified": "2024-06-21T17:39+09:00", "description": "EC-CUBE provided by EC-CUBE CO.,LTD. improperly handles HTTP Host header values (CWE-913).\r\n\r\nEC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000015.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "3.1", "@severity": "Low", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-000015", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN53871926/index.html", "@id": "JVN#53871926", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-25355", "@id": "CVE-2022-25355", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-25355", "@id": "CVE-2022-25355", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "EC-CUBE improperly handles HTTP Host header values" }
jvndb-2013-000063
Vulnerability from jvndb
Published
2013-06-27 14:31
Modified
2013-07-02 16:06
Summary
EC-CUBE vulnerable to cross-site scripting
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.
Note that this vulnerability is different from JVN#98665228.
Daiki Ishimori of Gehirn Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000063.html", "dc:date": "2013-07-02T16:06+09:00", "dcterms:issued": "2013-06-27T14:31+09:00", "dcterms:modified": "2013-07-02T16:06+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.\r\n\r\nNote that this vulnerability is different from JVN#98665228.\r\n\r\nDaiki Ishimori of Gehirn Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000063.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000063", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN07192063/index.html", "@id": "JVN#07192063", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3652", "@id": "CVE-2013-3652", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3652", "@id": "CVE-2013-3652", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE vulnerable to cross-site scripting" }
jvndb-2011-000011
Vulnerability from jvndb
Published
2011-02-02 14:54
Modified
2011-02-02 14:54
Summary
EC-CUBE vulnerable to cross-site scripting
Details
EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site scripting vulnerability.
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.
This vulnerability is different than the previous vulnerabilities disclosed on JVN.
Takeshi Terada of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000011.html", "dc:date": "2011-02-02T14:54+09:00", "dcterms:issued": "2011-02-02T14:54+09:00", "dcterms:modified": "2011-02-02T14:54+09:00", "description": "EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site scripting vulnerability.\r\n\r\nEC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.\r\n\r\nThis vulnerability is different than the previous vulnerabilities disclosed on JVN.\r\n\r\nTakeshi Terada of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000011.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000011", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN84393059/index.html", "@id": "JVN#84393059", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0451", "@id": "CVE-2011-0451", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0451", "@id": "CVE-2011-0451", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/43153", "@id": "SA43153", "@source": "SECUNIA" }, { "#text": "http://www.securityfocus.com/bid/46100", "@id": "46100", "@source": "BID" }, { "#text": "http://xforce.iss.net/xforce/xfdb/65079", "@id": "65079", "@source": "XF" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE vulnerable to cross-site scripting" }
jvndb-2014-000005
Vulnerability from jvndb
Published
2014-01-22 15:27
Modified
2014-01-27 09:51
Summary
EC-CUBE vulnerable to information alteration
Details
EC-CUBE contains an information alteration vulnerability.
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an information alteration vulnerability.
aratana inc. reported this vulnerability to the developer.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000005.html", "dc:date": "2014-01-27T09:51+09:00", "dcterms:issued": "2014-01-22T15:27+09:00", "dcterms:modified": "2014-01-27T09:51+09:00", "description": "EC-CUBE contains an information alteration vulnerability.\r\n\r\nEC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an information alteration vulnerability.\r\n\r\naratana inc. reported this vulnerability to the developer.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000005.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2014-000005", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN17849447/index.html", "@id": "JVN#17849447", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0807", "@id": "CVE-2014-0807", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0807", "@id": "CVE-2014-0807", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-264", "@title": "Permissions(CWE-264)" } ], "title": "EC-CUBE vulnerable to information alteration" }
jvndb-2013-000106
Vulnerability from jvndb
Published
2013-11-20 16:14
Modified
2013-11-22 14:18
Summary
EC-CUBE information disclosure vulnerability
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an information disclosure vulnerability due to an issue in processing front features.
LAC Co., Ltd. reported this vulnerability to the developer.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN55630933/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5995 | |
NVD | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5995 | |
IPA SECURITY ALERTS | http://www.ipa.go.jp/security/ciadr/vul/20131120-jvn.html | |
Information Exposure(CWE-200) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000106.html", "dc:date": "2013-11-22T14:18+09:00", "dcterms:issued": "2013-11-20T16:14+09:00", "dcterms:modified": "2013-11-22T14:18+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an information disclosure vulnerability due to an issue in processing front features.\r\n\r\nLAC Co., Ltd. reported this vulnerability to the developer.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000106.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.5", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000106", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN55630933/index.html", "@id": "JVN#55630933", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5995", "@id": "CVE-2013-5995", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5995", "@id": "CVE-2013-5995", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/ciadr/vul/20131120-jvn.html", "@id": "Security Alert for EC-CUBE information disclosure vulnerability (JVN#55630933)", "@source": "IPA SECURITY ALERTS" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-200", "@title": "Information Exposure(CWE-200)" } ], "title": "EC-CUBE information disclosure vulnerability" }
jvndb-2013-000107
Vulnerability from jvndb
Published
2013-11-20 15:56
Modified
2013-11-22 13:57
Summary
EC-CUBE vulnerable to cross-site scripting
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.
LAC Co., Ltd. reported this vulnerability to the developer.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000107.html", "dc:date": "2013-11-22T13:57+09:00", "dcterms:issued": "2013-11-20T15:56+09:00", "dcterms:modified": "2013-11-22T13:57+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.\r\n\r\nLAC Co., Ltd. reported this vulnerability to the developer.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000107.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000107", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN06377589/index.html", "@id": "JVN#06377589", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5996", "@id": "CVE-2013-5996", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5996", "@id": "CVE-2013-5996", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE vulnerable to cross-site scripting" }
jvndb-2013-000065
Vulnerability from jvndb
Published
2013-06-27 14:33
Modified
2013-07-02 16:15
Summary
EC-CUBE vulnerable to directory traversal
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a directory traversal vulnerability.
Note that this vulnerability is different from JVN#43886811.
LOCKON CO.,LTD. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
LOCKON CO.,LTD. credits System Friend,lnc. for reporting this vulnerability.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000065.html", "dc:date": "2013-07-02T16:15+09:00", "dcterms:issued": "2013-06-27T14:33+09:00", "dcterms:modified": "2013-07-02T16:15+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a directory traversal vulnerability.\r\n\r\nNote that this vulnerability is different from JVN#43886811.\r\nLOCKON CO.,LTD. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\nLOCKON CO.,LTD. credits System Friend,lnc. for reporting this vulnerability.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000065.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000065", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN04161229/index.html", "@id": "JVN#04161229", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3654", "@id": "CVE-2013-3654", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3654", "@id": "CVE-2013-3654", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" } ], "title": "EC-CUBE vulnerable to directory traversal" }
jvndb-2013-000044
Vulnerability from jvndb
Published
2013-05-23 15:46
Modified
2013-05-23 15:46
Summary
EC-CUBE vulnerable to information disclosure as a result of improper input checking
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an issue with checking input values, which may result in information disclosure.
LOCKON CO.,LTD. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
LOCKON CO.,LTD. credits System Friend,lnc. for reporting this vulnerability.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN39699406/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2315 | |
NVD | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2315 | |
Improper Input Validation(CWE-20) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000044.html", "dc:date": "2013-05-23T15:46+09:00", "dcterms:issued": "2013-05-23T15:46+09:00", "dcterms:modified": "2013-05-23T15:46+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an issue with checking input values, which may result in information disclosure.\r\n\r\nLOCKON CO.,LTD. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\nLOCKON CO.,LTD. credits System Friend,lnc. for reporting this vulnerability.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000044.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000044", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN39699406/index.html", "@id": "JVN#39699406", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2315", "@id": "CVE-2013-2315", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2315", "@id": "CVE-2013-2315", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-20", "@title": "Improper Input Validation(CWE-20)" } ], "title": "EC-CUBE vulnerable to information disclosure as a result of improper input checking" }
jvndb-2016-000052
Vulnerability from jvndb
Published
2016-04-26 13:56
Modified
2016-05-31 17:41
Severity ?
Summary
EC-CUBE fails to restrict access permissions
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE fails to restrict access permissions.
Note that this vulnerability is different from JVN#47473944.
Gen Sato of TRADE WORKS Co.,Ltd. Security Dept. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000052.html", "dc:date": "2016-05-31T17:41+09:00", "dcterms:issued": "2016-04-26T13:56+09:00", "dcterms:modified": "2016-05-31T17:41+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE fails to restrict access permissions.\r\n\r\nNote that this vulnerability is different from JVN#47473944.\r\n\r\nGen Sato of TRADE WORKS Co.,Ltd. Security Dept. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000052.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "5.5", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "@version": "2.0" }, { "@score": "5.4", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2016-000052", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN11458774/index.html", "@id": "JVN#11458774", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1200", "@id": "CVE-2016-1200", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1200", "@id": "CVE-2016-1200", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-264", "@title": "Permissions(CWE-264)" } ], "title": "EC-CUBE fails to restrict access permissions" }
jvndb-2013-000064
Vulnerability from jvndb
Published
2013-06-27 14:31
Modified
2013-07-02 16:10
Summary
EC-CUBE vulnerable to cross-site scripting
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.
Note that this vulnerability is different from JVN#07192063.
Ren Hirasawa of Gehirn Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000064.html", "dc:date": "2013-07-02T16:10+09:00", "dcterms:issued": "2013-06-27T14:31+09:00", "dcterms:modified": "2013-07-02T16:10+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.\r\n\r\nNote that this vulnerability is different from JVN#07192063.\r\n\r\nRen Hirasawa of Gehirn Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000064.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000064", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN98665228/index.html", "@id": "JVN#98665228", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3653", "@id": "CVE-2013-3653", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3653", "@id": "CVE-2013-3653", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE vulnerable to cross-site scripting" }
jvndb-2021-000100
Vulnerability from jvndb
Published
2021-11-11 15:09
Modified
2021-11-11 15:09
Severity ?
Summary
Multiple vulnerabilities in EC-CUBE 2 series
Details
EC-CUBE 2 series provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities listed below.
* Improper access control in Management screen (CWE-284) - CVE-2021-20841
* Cross-site request forgery vulnerability in Management screen (CWE-352) - CVE-2021-20842
EC-CUBE CO.,LTD. reported these vulnerabilities to JPCERT/CC to notify users of the solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000100.html", "dc:date": "2021-11-11T15:09+09:00", "dcterms:issued": "2021-11-11T15:09+09:00", "dcterms:modified": "2021-11-11T15:09+09:00", "description": "EC-CUBE 2 series provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities listed below.\r\n* Improper access control in Management screen (CWE-284) - CVE-2021-20841\r\n* Cross-site request forgery vulnerability in Management screen (CWE-352) - CVE-2021-20842\r\n\r\nEC-CUBE CO.,LTD. reported these vulnerabilities to JPCERT/CC to notify users of the solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000100.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "4.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2021-000100", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN75444925/index.html", "@id": "JVN#75444925", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20841", "@id": "CVE-2021-20841", "@source": "CVE" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20842", "@id": "CVE-2021-20842", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20841", "@id": "CVE-2021-20841", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20842", "@id": "CVE-2021-20842", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-264", "@title": "Permissions(CWE-264)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" } ], "title": "Multiple vulnerabilities in EC-CUBE 2 series" }
jvndb-2022-000073
Vulnerability from jvndb
Published
2022-09-15 16:30
Modified
2024-06-13 11:09
Severity ?
Summary
Multiple vulnerabilities in EC-CUBE
Details
EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities listed below.
* Directory traversal vulnerability (CWE-22) - CVE-2022-40199
* DOM-based cross-site scripting vulnerability (CWE-79) - CVE-2022-38975
Noriaki Iwasaki of Cyber Defense Institute, Inc. reported these vulnerabilities to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported them to JPCERT/CC to notify users of the solutions through JVN.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN21213852/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-40199 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-38975 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-40199 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-38975 | |
Path Traversal(CWE-22) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000073.html", "dc:date": "2024-06-13T11:09+09:00", "dcterms:issued": "2022-09-15T16:30+09:00", "dcterms:modified": "2024-06-13T11:09+09:00", "description": "EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities listed below. \r\n * Directory traversal vulnerability (CWE-22) - CVE-2022-40199 \r\n * DOM-based cross-site scripting vulnerability (CWE-79) - CVE-2022-38975 \r\n\r\nNoriaki Iwasaki of Cyber Defense Institute, Inc. reported these vulnerabilities to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported them to JPCERT/CC to notify users of the solutions through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000073.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "4.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "@version": "2.0" }, { "@score": "2.7", "@severity": "Low", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-000073", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN21213852/index.html", "@id": "JVN#21213852", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-40199", "@id": "CVE-2022-40199", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-38975", "@id": "CVE-2022-38975", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-40199", "@id": "CVE-2022-40199", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-38975", "@id": "CVE-2022-38975", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple vulnerabilities in EC-CUBE" }
jvndb-2013-000098
Vulnerability from jvndb
Published
2013-11-20 15:48
Modified
2013-11-22 14:35
Summary
EC-CUBE information disclosure vulnerability
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an information disclosure vulnerability.
Gen Sato reported this vulnerability to the developer.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000098.html", "dc:date": "2013-11-22T14:35+09:00", "dcterms:issued": "2013-11-20T15:48+09:00", "dcterms:modified": "2013-11-22T14:35+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an information disclosure vulnerability.\r\n\r\nGen Sato reported this vulnerability to the developer.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000098.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000098", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN06870202/index.html", "@id": "JVN#06870202", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5994", "@id": "CVE-2013-5994", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5994", "@id": "CVE-2013-5994", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-200", "@title": "Information Exposure(CWE-200)" } ], "title": "EC-CUBE information disclosure vulnerability" }
jvndb-2008-000075
Vulnerability from jvndb
Published
2008-11-06 16:04
Modified
2009-06-25 15:44
Summary
EC-CUBE vulnerable to SQL injection
Details
EC-CUBE provided by LOCKON CO.,LTD. contains a SQL injection vulnerability.
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a SQL injection vulnerability.
This vulnerability is different from JVN#81111541.
An updated version addressing this vulnerability was released on November 7, 2008
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000075.html", "dc:date": "2009-06-25T15:44+09:00", "dcterms:issued": "2008-11-06T16:04+09:00", "dcterms:modified": "2009-06-25T15:44+09:00", "description": "EC-CUBE provided by LOCKON CO.,LTD. contains a SQL injection vulnerability.\r\n\r\nEC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a SQL injection vulnerability.\r\n\r\nThis vulnerability is different from JVN#81111541.\r\n\r\nAn updated version addressing this vulnerability was released on November 7, 2008", "link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000075.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "7.5", "@severity": "High", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2008-000075", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN19072922/index.html", "@id": "JVN#19072922", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4991", "@id": "CVE-2008-4991", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4991", "@id": "CVE-2008-4991", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/english/vuln/200811_EC-CUBE_en.html", "@id": "Security Alert for EC-CUBE Vulnerability", "@source": "IPA SECURITY ALERTS" }, { "#text": "http://www.ipa.go.jp/security/vuln/documents/2009/200907_ec-cube.html", "@id": "200907_ec-cube", "@source": "IPA SECURITY ALERTS" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000075.html", "@id": "JVNDB-2008-000075", "@source": "JVNDB_Ja" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-89", "@title": "SQL Injection(CWE-89)" } ], "title": "EC-CUBE vulnerable to SQL injection" }
jvndb-2016-000053
Vulnerability from jvndb
Published
2016-04-26 14:24
Modified
2016-05-31 17:40
Severity ?
Summary
EC-CUBE vulnerable to cross-site request forgery
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site request forgery vulnerability (CWE-352).
LOCKON CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and LOCKON CO.,LTD. coordinated under the Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN73776243/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1201 | |
NVD | https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1201 | |
Cross-Site Request Forgery(CWE-352) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000053.html", "dc:date": "2016-05-31T17:40+09:00", "dcterms:issued": "2016-04-26T14:24+09:00", "dcterms:modified": "2016-05-31T17:40+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site request forgery vulnerability (CWE-352).\r\n\r\nLOCKON CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and LOCKON CO.,LTD. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000053.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2016-000053", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN73776243/index.html", "@id": "JVN#73776243", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1201", "@id": "CVE-2016-1201", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1201", "@id": "CVE-2016-1201", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" } ], "title": "EC-CUBE vulnerable to cross-site request forgery" }
jvndb-2021-000059
Vulnerability from jvndb
Published
2021-07-01 15:49
Modified
2021-07-01 15:49
Severity ?
Summary
EC-CUBE fails to restrict access permissions
Details
EC-CUBE provided by EC-CUBE CO.,LTD. fails to restrict access permissions (CWE-284) .
EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000059.html", "dc:date": "2021-07-01T15:49+09:00", "dcterms:issued": "2021-07-01T15:49+09:00", "dcterms:modified": "2021-07-01T15:49+09:00", "description": "EC-CUBE provided by EC-CUBE CO.,LTD. fails to restrict access permissions (CWE-284) .\r\n\r\nEC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000059.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, { "@score": "7.5", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2021-000059", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN57942445/index.html", "@id": "JVN#57942445", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20778", "@id": "CVE-2021-20778", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20778", "@id": "CVE-2021-20778", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-264", "@title": "Permissions(CWE-264)" } ], "title": "EC-CUBE fails to restrict access permissions" }
jvndb-2013-000097
Vulnerability from jvndb
Published
2013-11-20 15:40
Modified
2013-11-22 14:37
Summary
EC-CUBE vulnerable to cross-site request forgery
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site request forgery vulnerability.
Gen Sato reported this vulnerability to the developer.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN11221613/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5993 | |
NVD | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5993 | |
Cross-Site Request Forgery(CWE-352) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000097.html", "dc:date": "2013-11-22T14:37+09:00", "dcterms:issued": "2013-11-20T15:40+09:00", "dcterms:modified": "2013-11-22T14:37+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site request forgery vulnerability.\r\n\r\nGen Sato reported this vulnerability to the developer.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000097.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000097", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN11221613/index.html", "@id": "JVN#11221613", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5993", "@id": "CVE-2013-5993", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5993", "@id": "CVE-2013-5993", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" } ], "title": "EC-CUBE vulnerable to cross-site request forgery" }
jvndb-2014-000006
Vulnerability from jvndb
Published
2014-01-22 15:28
Modified
2024-05-15 14:59
Summary
EC-CUBE vulnerable to authorization bypass
Details
EC-CUBE contains an authorization bypass vulnerability.
EC-CUBE from EC-CUBE CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an authorization bypass vulnerability (CWE-639).
The developer reported this vulnerability to JPCERT/CC under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000006.html", "dc:date": "2024-05-15T14:59+09:00", "dcterms:issued": "2014-01-22T15:28+09:00", "dcterms:modified": "2024-05-15T14:59+09:00", "description": "EC-CUBE contains an authorization bypass vulnerability.\r\n\r\nEC-CUBE from EC-CUBE CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains an authorization bypass vulnerability (CWE-639).\r\n\r\nThe developer reported this vulnerability to JPCERT/CC under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000006.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2014-000006", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN51770585/index.html", "@id": "JVN#51770585", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0808", "@id": "CVE-2014-0808", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0808", "@id": "CVE-2014-0808", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-264", "@title": "Permissions(CWE-264)" } ], "title": "EC-CUBE vulnerable to authorization bypass" }
jvndb-2016-000051
Vulnerability from jvndb
Published
2016-04-26 13:56
Modified
2016-05-31 17:41
Severity ?
Summary
EC-CUBE fails to restrict access permissions
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE fails to restrict access permissions.
Note that this vulnerability is different from JVN#11458774.
Gen Sato of TRADE WORKS Co.,Ltd. Security Dept. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000051.html", "dc:date": "2016-05-31T17:41+09:00", "dcterms:issued": "2016-04-26T13:56+09:00", "dcterms:modified": "2016-05-31T17:41+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE fails to restrict access permissions.\r\n\r\nNote that this vulnerability is different from JVN#11458774.\r\n\r\nGen Sato of TRADE WORKS Co.,Ltd. Security Dept. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000051.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, { "@score": "5.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2016-000051", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN47473944/index.html", "@id": "JVN#47473944", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1199", "@id": "CVE-2016-1199", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1199", "@id": "CVE-2016-1199", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-264", "@title": "Permissions(CWE-264)" } ], "title": "EC-CUBE fails to restrict access permissions" }
jvndb-2013-000062
Vulnerability from jvndb
Published
2013-06-27 14:29
Modified
2013-07-02 16:01
Summary
EC-CUBE vulnerable to code injection
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a code injection vulnerability.
Gen Sato reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000062.html", "dc:date": "2013-07-02T16:01+09:00", "dcterms:issued": "2013-06-27T14:29+09:00", "dcterms:modified": "2013-07-02T16:01+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a code injection vulnerability.\r\n\r\nGen Sato reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000062.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "7.5", "@severity": "High", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000062", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN34900750/index.html", "@id": "JVN#34900750", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3651", "@id": "CVE-2013-3651", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3651", "@id": "CVE-2013-3651", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/ciadr/vul/20130627-jvn.html", "@id": "Security Updates Available for EC-CUBE (JVN#34900750)", "@source": "IPA SECURITY ALERTS" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-94", "@title": "Code Injection(CWE-94)" } ], "title": "EC-CUBE vulnerable to code injection" }
jvndb-2023-000019
Vulnerability from jvndb
Published
2023-02-28 16:38
Modified
2024-06-10 17:28
Severity ?
Summary
Multiple cross-site scripting vulnerabilities in EC-CUBE
Details
EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple cross-site scripting vulnerabilities listed below.
* Cross-site scripting vulnerability in Contents Management (CWE-79) - CVE-2023-22438
* Cross-site scripting vulnerability in Authentication Key Settings (CWE-79) - CVE-2023-25077
* Cross-site scripting vulnerability in Product List Screen and Product Detail Screen (CWE-79) - CVE-2023-22838
CVE-2023-22438
Gaku Mochizuki, Taiga Shirakura of Mitsui Bussan Secure Directions, Inc. and Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-25077
Noriaki Iwasaki of Cyber Defense Institute, Inc. reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
CVE-2023-22838
Rei TAKAHASHI of Hashiura Lab., Dept. of Data Science, Nippon Institute of Technology reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported it to JPCERT/CC to notify users of its solution through JVN.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000019.html", "dc:date": "2024-06-10T17:28+09:00", "dcterms:issued": "2023-02-28T16:38+09:00", "dcterms:modified": "2024-06-10T17:28+09:00", "description": "EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple cross-site scripting vulnerabilities listed below.\r\n\r\n* Cross-site scripting vulnerability in Contents Management (CWE-79) - CVE-2023-22438\r\n* Cross-site scripting vulnerability in Authentication Key Settings (CWE-79) - CVE-2023-25077\r\n* Cross-site scripting vulnerability in Product List Screen and Product Detail Screen (CWE-79) - CVE-2023-22838\r\n\r\nCVE-2023-22438\r\nGaku Mochizuki, Taiga Shirakura of Mitsui Bussan Secure Directions, Inc. and Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nCVE-2023-25077\r\nNoriaki Iwasaki of Cyber Defense Institute, Inc. reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. Inc. reported it to JPCERT/CC to notify users of its solution through JVN.\r\n\r\nCVE-2023-22838\r\nRei TAKAHASHI of Hashiura Lab., Dept. of Data Science, Nippon Institute of Technology reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported it to JPCERT/CC to notify users of its solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000019.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "3.5", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "5.4", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2023-000019", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN04785663/index.html", "@id": "JVN#04785663", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-22438", "@id": "CVE-2023-22438", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-25077", "@id": "CVE-2023-25077", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-22838", "@id": "CVE-2023-22838", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-22438", "@id": "CVE-2023-22438", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-22838", "@id": "CVE-2023-22838", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-25077", "@id": "CVE-2023-25077", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple cross-site scripting vulnerabilities in EC-CUBE" }
jvndb-2023-000107
Vulnerability from jvndb
Published
2023-11-07 13:47
Modified
2024-05-09 17:17
Severity ?
Summary
EC-CUBE 3 series and 4 series vulnerable to arbitrary code execution
Details
EC-CUBE 3 series and 4 series provided by EC-CUBE CO.,LTD. contain an arbitrary code execution vulnerability (CWE-94) due to improper settings of the product's template engine "Twig".
Takeshi Miura of N.F.Laboratories Inc. reported this vulnerability to EC-CUBE CO.,LTD.
EC-CUBE CO.,LTD. Inc. reported this case to JPCERT/CC to notify users of its solution through JVN.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000107.html", "dc:date": "2024-05-09T17:17+09:00", "dcterms:issued": "2023-11-07T13:47+09:00", "dcterms:modified": "2024-05-09T17:17+09:00", "description": "EC-CUBE 3 series and 4 series provided by EC-CUBE CO.,LTD. contain an arbitrary code execution vulnerability (CWE-94) due to improper settings of the product\u0027s template engine \"Twig\".\r\n\r\nTakeshi Miura of N.F.Laboratories Inc. reported this vulnerability to EC-CUBE CO.,LTD.\r\nEC-CUBE CO.,LTD. Inc. reported this case to JPCERT/CC to notify users of its solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000107.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "6.5", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "@version": "2.0" }, { "@score": "7.2", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" } ], "sec:identifier": "JVNDB-2023-000107", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN29195731/index.html", "@id": "JVN#29195731", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-46845", "@id": "CVE-2023-46845", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-46845", "@id": "CVE-2023-46845", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-94", "@title": "Code Injection(CWE-94)" } ], "title": "EC-CUBE 3 series and 4 series vulnerable to arbitrary code execution" }
jvndb-2013-000081
Vulnerability from jvndb
Published
2013-08-30 14:38
Modified
2013-09-02 18:25
Summary
EC-CUBE vulnerable to directory traversal when used in Windows
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a directory traversal vulnerability when used in Windows.
Gen Sato reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000081.html", "dc:date": "2013-09-02T18:25+09:00", "dcterms:issued": "2013-08-30T14:38+09:00", "dcterms:modified": "2013-09-02T18:25+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a directory traversal vulnerability when used in Windows.\r\n\r\nGen Sato reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000081.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000081", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN15973066/index.html", "@id": "JVN#15973066", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4702", "@id": "CVE-2013-4702", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4702", "@id": "CVE-2013-4702", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" } ], "title": "EC-CUBE vulnerable to directory traversal when used in Windows" }
jvndb-2013-000105
Vulnerability from jvndb
Published
2013-11-20 15:34
Modified
2013-11-22 14:40
Summary
EC-CUBE vulnerable to cross-site scripting
Details
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a vulnerability in processing the output of error messages, which may lead to cross-site scripting.
Gen Sato reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000105.html", "dc:date": "2013-11-22T14:40+09:00", "dcterms:issued": "2013-11-20T15:34+09:00", "dcterms:modified": "2013-11-22T14:40+09:00", "description": "EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a vulnerability in processing the output of error messages, which may lead to cross-site scripting.\r\n\r\nGen Sato reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000105.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2013-000105", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN38790987/index.html", "@id": "JVN#38790987", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5992", "@id": "CVE-2013-5992", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5992", "@id": "CVE-2013-5992", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE vulnerable to cross-site scripting" }
jvndb-2008-000063
Vulnerability from jvndb
Published
2008-10-01 16:32
Modified
2008-10-01 16:32
Summary
EC-CUBE cross-site scripting vulnerability
Details
EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site scripting vulnerability.
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.
This vulnerability is different from JVN#61543834, JVN#26621646, and JVN#99916563.
Naruhisa Tadokoro of Kobe Digital Labo.,Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000063.html", "dc:date": "2008-10-01T16:32+09:00", "dcterms:issued": "2008-10-01T16:32+09:00", "dcterms:modified": "2008-10-01T16:32+09:00", "description": "EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site scripting vulnerability.\r\n\r\nEC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site scripting vulnerability.\r\nThis vulnerability is different from JVN#61543834, JVN#26621646, and JVN#99916563.\r\n\r\nNaruhisa Tadokoro of Kobe Digital Labo.,Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000063.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2008-000063", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN36085487/index.html", "@id": "JVN#36085487", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4536", "@id": "CVE-2008-4536", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4536", "@id": "CVE-2008-4536", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/vuln/documents/2009/200907_ec-cube.html", "@id": "200907_ec-cube", "@source": "IPA SECURITY ALERTS" }, { "#text": "http://secunia.com/advisories/32065", "@id": "SA32065", "@source": "SECUNIA" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000063.html", "@id": "JVNDB-2008-000063", "@source": "JVNDB_Ja" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE cross-site scripting vulnerability" }
jvndb-2021-000057
Vulnerability from jvndb
Published
2021-06-23 15:15
Modified
2021-06-23 15:15
Severity ?
Summary
Multiple cross-site scripting vulnerabilities in EC-CUBE
Details
EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple cross-site scripting vulnerabilities listed below.
*Cross-site scripting vulnerability (CWE-79) - CVE-2021-20750
*Cross-site scripting vulnerability (CWE-79) - CVE-2021-20751
hibiki moriyama of STNet, Incorporated reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000057.html", "dc:date": "2021-06-23T15:15+09:00", "dcterms:issued": "2021-06-23T15:15+09:00", "dcterms:modified": "2021-06-23T15:15+09:00", "description": "EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple cross-site scripting vulnerabilities listed below.\r\n*Cross-site scripting vulnerability (CWE-79) - CVE-2021-20750\r\n*Cross-site scripting vulnerability (CWE-79) - CVE-2021-20751\r\n\r\nhibiki moriyama of STNet, Incorporated reported these vulnerabilities to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000057.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "6.1", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2021-000057", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN95292458/index.html", "@id": "JVN#95292458", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20750", "@id": "CVE-2021-20750", "@source": "CVE" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20751", "@id": "CVE-2021-20751", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20750", "@id": "CVE-2021-20750", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20751", "@id": "CVE-2021-20751", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple cross-site scripting vulnerabilities in EC-CUBE" }
jvndb-2023-000082
Vulnerability from jvndb
Published
2023-08-17 15:12
Modified
2024-03-25 18:07
Severity ?
Summary
EC-CUBE 2 series vulnerable to cross-site scripting
Details
EC-CUBE 2 series provided by EC-CUBE CO.,LTD. contains a cross-site scripting vulnerability (CWE-79) in "mail/template" and "products/product" of Management page.
Shimamine Taihei of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported it to JPCERT/CC to notify users of its solution through JVN.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN46993816/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2023-40281 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2023-40281 | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000082.html", "dc:date": "2024-03-25T18:07+09:00", "dcterms:issued": "2023-08-17T15:12+09:00", "dcterms:modified": "2024-03-25T18:07+09:00", "description": "EC-CUBE 2 series provided by EC-CUBE CO.,LTD. contains a cross-site scripting vulnerability (CWE-79) in \"mail/template\" and \"products/product\" of Management page.\r\n\r\nShimamine Taihei of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported it to JPCERT/CC to notify users of its solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000082.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": [ { "@score": "2.1", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.8", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2023-000082", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN46993816/index.html", "@id": "JVN#46993816", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-40281", "@id": "CVE-2023-40281", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-40281", "@id": "CVE-2023-40281", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "EC-CUBE 2 series vulnerable to cross-site scripting" }
jvndb-2024-000080
Vulnerability from jvndb
Published
2024-07-30 13:56
Modified
2024-07-30 13:56
Severity ?
Summary
EC-CUBE 4 Series improper input validation when installing plugins
Details
EC-CUBE 4 series provided by EC-CUBE CO.,LTD improperly validates inputs when installing plugins (CWE-349).
EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN48324254/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-41924 | |
No Mapping(CWE-Other) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000080.html", "dc:date": "2024-07-30T13:56+09:00", "dcterms:issued": "2024-07-30T13:56+09:00", "dcterms:modified": "2024-07-30T13:56+09:00", "description": "EC-CUBE 4 series provided by EC-CUBE CO.,LTD improperly validates inputs when installing plugins (CWE-349).\r\n\r\nEC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000080.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N", "@version": "3.0" }, "sec:identifier": "JVNDB-2024-000080", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN48324254/index.html", "@id": "JVN#48324254", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-41924", "@id": "CVE-2024-41924", "@source": "CVE" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "EC-CUBE 4 Series improper input validation when installing plugins" }
jvndb-2011-000029
Vulnerability from jvndb
Published
2011-05-11 08:44
Modified
2011-05-11 08:44
Summary
EC-CUBE vulnerable to cross-site request forgery
Details
EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site request forgery vulnerability.
EC-CUBE provided by LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site request forgery vulnerability.
Masako Oono reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN37878530 | |
CVE | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1325 | |
NVD | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1325 | |
SECUNIA | http://secunia.com/advisories/44487 | |
OSVDB | http://osvdb.org/72239 | |
Cross-Site Request Forgery(CWE-352) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000029.html", "dc:date": "2011-05-11T08:44+09:00", "dcterms:issued": "2011-05-11T08:44+09:00", "dcterms:modified": "2011-05-11T08:44+09:00", "description": "EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site request forgery vulnerability.\r\n\r\nEC-CUBE provided by LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site request forgery vulnerability.\r\n\r\nMasako Oono reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000029.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000029", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN37878530", "@id": "JVN#37878530", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1325", "@id": "CVE-2011-1325", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1325", "@id": "CVE-2011-1325", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/44487", "@id": "SA44487", "@source": "SECUNIA" }, { "#text": "http://osvdb.org/72239", "@id": "72239", "@source": "OSVDB" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" } ], "title": "EC-CUBE vulnerable to cross-site request forgery" }
jvndb-2008-000065
Vulnerability from jvndb
Published
2008-10-01 16:31
Modified
2008-10-01 16:31
Summary
EC-CUBE vulnerable to SQL injection
Details
EC-CUBE provided by LOCKON CO.,LTD. contains a SQL injection vulnerability.
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a SQL injection vulnerability.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
EC-CUBE CO.,LTD. | EC-CUBE |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000065.html", "dc:date": "2008-10-01T16:31+09:00", "dcterms:issued": "2008-10-01T16:31+09:00", "dcterms:modified": "2008-10-01T16:31+09:00", "description": "EC-CUBE provided by LOCKON CO.,LTD. contains a SQL injection vulnerability.\r\n\r\nEC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a SQL injection vulnerability.", "link": "https://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000065.html", "sec:cpe": { "#text": "cpe:/a:ec-cube:ec-cube", "@product": "EC-CUBE", "@vendor": "EC-CUBE CO.,LTD.", "@version": "2.2" }, "sec:cvss": { "@score": "7.5", "@severity": "High", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2008-000065", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN81111541/index.html", "@id": "JVN#81111541", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4534", "@id": "CVE-2008-4534", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4534", "@id": "CVE-2008-4534", "@source": "NVD" }, { "#text": "http://www.ipa.go.jp/security/vuln/documents/2009/200907_ec-cube.html", "@id": "200907_ec-cube", "@source": "IPA SECURITY ALERTS" }, { "#text": "http://www.ipa.go.jp/security/english/vuln/200810_EC-CUBE_en.html", "@id": "Security Alert for EC-CUBE Vulnerability", "@source": "IPA SECURITY ALERTS" }, { "#text": "http://secunia.com/advisories/32065", "@id": "SA32065", "@source": "SECUNIA" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000065.html", "@id": "JVNDB-2008-000065", "@source": "JVNDB_Ja" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-89", "@title": "SQL Injection(CWE-89)" } ], "title": "EC-CUBE vulnerable to SQL injection" }
cve-2021-20778
Vulnerability from cvelistv5
Published
2021-07-01 05:45
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Improper access control vulnerability in EC-CUBE 4.0.6 (EC-CUBE 4 series) allows a remote attacker to bypass access restriction and obtain sensitive information via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://www.ec-cube.net/info/weakness/weakness.php?id=80 | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN57942445/index.html | x_refsource_MISC | |
http://jvn.jp/en/jp/JVN57942445/index.html | third-party-advisory, x_refsource_JVN |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | EC-CUBE CO.,LTD. | EC-CUBE |
Version: 4.0.6 (EC-CUBE 4 series) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=80" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN57942445/index.html" }, { "name": "JVN#57942445", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN57942445/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EC-CUBE", "vendor": "EC-CUBE CO.,LTD.", "versions": [ { "status": "affected", "version": "4.0.6 (EC-CUBE 4 series)" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control vulnerability in EC-CUBE 4.0.6 (EC-CUBE 4 series) allows a remote attacker to bypass access restriction and obtain sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-01T06:06:26", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=80" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN57942445/index.html" }, { "name": "JVN#57942445", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN57942445/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20778", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EC-CUBE", "version": { "version_data": [ { "version_value": "4.0.6 (EC-CUBE 4 series)" } ] } } ] }, "vendor_name": "EC-CUBE CO.,LTD." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access control vulnerability in EC-CUBE 4.0.6 (EC-CUBE 4 series) allows a remote attacker to bypass access restriction and obtain sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ec-cube.net/info/weakness/weakness.php?id=80", "refsource": "MISC", "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=80" }, { "name": "https://jvn.jp/en/jp/JVN57942445/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN57942445/index.html" }, { "name": "JVN#57942445", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN57942445/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20778", "datePublished": "2021-07-01T05:45:17", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.168Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5680
Vulnerability from cvelistv5
Published
2020-12-03 11:15
Modified
2024-08-04 08:39
Severity ?
EPSS score ?
Summary
Improper input validation vulnerability in EC-CUBE versions from 3.0.5 to 3.0.18 allows a remote attacker to cause a denial-of-service (DoS) condition via unspecified vector.
References
▼ | URL | Tags |
---|---|---|
https://www.ec-cube.net/info/weakness/ | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN24457594/index.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | EC-CUBE CO.,LTD. | EC-CUBE |
Version: versions from 3.0.5 to 3.0.18 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:39:25.655Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ec-cube.net/info/weakness/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN24457594/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EC-CUBE", "vendor": "EC-CUBE CO.,LTD.", "versions": [ { "status": "affected", "version": "versions from 3.0.5 to 3.0.18" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation vulnerability in EC-CUBE versions from 3.0.5 to 3.0.18 allows a remote attacker to cause a denial-of-service (DoS) condition via unspecified vector." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-03T11:15:33", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ec-cube.net/info/weakness/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN24457594/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5680", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EC-CUBE", "version": { "version_data": [ { "version_value": "versions from 3.0.5 to 3.0.18" } ] } } ] }, "vendor_name": "EC-CUBE CO.,LTD." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation vulnerability in EC-CUBE versions from 3.0.5 to 3.0.18 allows a remote attacker to cause a denial-of-service (DoS) condition via unspecified vector." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ec-cube.net/info/weakness/", "refsource": "MISC", "url": "https://www.ec-cube.net/info/weakness/" }, { "name": "https://jvn.jp/en/jp/JVN24457594/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN24457594/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5680", "datePublished": "2020-12-03T11:15:33", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:39:25.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20750
Vulnerability from cvelistv5
Published
2021-06-28 00:50
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in EC-CUBE EC-CUBE 3.0.0 to 3.0.18-p2 (EC-CUBE 3 series) and EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation.
References
▼ | URL | Tags |
---|---|---|
https://www.ec-cube.net/info/weakness/weakness.php?id=79 | x_refsource_MISC | |
https://www.ec-cube.net/info/weakness/weakness.php?id=78 | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN95292458/index.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | EC-CUBE CO.,LTD. | EC-CUBE |
Version: EC-CUBE 3.0.0 to 3.0.18-p2 (EC-CUBE 3 series) and EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:21.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=79" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=78" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN95292458/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EC-CUBE", "vendor": "EC-CUBE CO.,LTD.", "versions": [ { "status": "affected", "version": "EC-CUBE 3.0.0 to 3.0.18-p2 (EC-CUBE 3 series) and EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series)" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in EC-CUBE EC-CUBE 3.0.0 to 3.0.18-p2 (EC-CUBE 3 series) and EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-28T00:50:39", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=79" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=78" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN95292458/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20750", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EC-CUBE", "version": { "version_data": [ { "version_value": "EC-CUBE 3.0.0 to 3.0.18-p2 (EC-CUBE 3 series) and EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series)" } ] } } ] }, "vendor_name": "EC-CUBE CO.,LTD." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in EC-CUBE EC-CUBE 3.0.0 to 3.0.18-p2 (EC-CUBE 3 series) and EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ec-cube.net/info/weakness/weakness.php?id=79", "refsource": "MISC", "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=79" }, { "name": "https://www.ec-cube.net/info/weakness/weakness.php?id=78", "refsource": "MISC", "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=78" }, { "name": "https://jvn.jp/en/jp/JVN95292458/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN95292458/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20750", "datePublished": "2021-06-28T00:50:39", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:21.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20717
Vulnerability from cvelistv5
Published
2021-05-10 09:10
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a remote attacker to inject a specially crafted script in the specific input field of the EC web site which is created using EC-CUBE. As a result, it may lead to an arbitrary script execution on the administrator's web browser.
References
▼ | URL | Tags |
---|---|---|
https://www.ec-cube.net/news/detail.php?news_id=384 | x_refsource_MISC | |
https://www.ec-cube.net/news/detail.php?news_id=383 | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN97554111/index.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | EC-CUBE CO.,LTD. | EC-CUBE |
Version: 4.0.0 to 4.0.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:21.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ec-cube.net/news/detail.php?news_id=384" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ec-cube.net/news/detail.php?news_id=383" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN97554111/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EC-CUBE", "vendor": "EC-CUBE CO.,LTD.", "versions": [ { "status": "affected", "version": "4.0.0 to 4.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a remote attacker to inject a specially crafted script in the specific input field of the EC web site which is created using EC-CUBE. As a result, it may lead to an arbitrary script execution on the administrator\u0027s web browser." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-10T09:10:14", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ec-cube.net/news/detail.php?news_id=384" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ec-cube.net/news/detail.php?news_id=383" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN97554111/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20717", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EC-CUBE", "version": { "version_data": [ { "version_value": "4.0.0 to 4.0.5" } ] } } ] }, "vendor_name": "EC-CUBE CO.,LTD." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a remote attacker to inject a specially crafted script in the specific input field of the EC web site which is created using EC-CUBE. As a result, it may lead to an arbitrary script execution on the administrator\u0027s web browser." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ec-cube.net/news/detail.php?news_id=384", "refsource": "MISC", "url": "https://www.ec-cube.net/news/detail.php?news_id=384" }, { "name": "https://www.ec-cube.net/news/detail.php?news_id=383", "refsource": "MISC", "url": "https://www.ec-cube.net/news/detail.php?news_id=383" }, { "name": "https://jvn.jp/en/jp/JVN97554111/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN97554111/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20717", "datePublished": "2021-05-10T09:10:14", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:21.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5679
Vulnerability from cvelistv5
Published
2020-12-03 11:15
Modified
2024-08-04 08:39
Severity ?
EPSS score ?
Summary
Improper restriction of rendered UI layers or frames in EC-CUBE versions from 3.0.0 to 3.0.18 leads to clickjacking attacks. If a user accesses a specially crafted page while logged into the administrative page, unintended operations may be conducted.
References
▼ | URL | Tags |
---|---|---|
https://www.ec-cube.net/info/weakness/ | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN24457594/index.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | EC-CUBE CO.,LTD. | EC-CUBE |
Version: versions from 3.0.0 to 3.0.18 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:39:25.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ec-cube.net/info/weakness/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN24457594/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EC-CUBE", "vendor": "EC-CUBE CO.,LTD.", "versions": [ { "status": "affected", "version": "versions from 3.0.0 to 3.0.18" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper restriction of rendered UI layers or frames in EC-CUBE versions from 3.0.0 to 3.0.18 leads to clickjacking attacks. If a user accesses a specially crafted page while logged into the administrative page, unintended operations may be conducted." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of Rendered UI Layers or Frames", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-03T11:15:32", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ec-cube.net/info/weakness/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN24457594/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5679", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EC-CUBE", "version": { "version_data": [ { "version_value": "versions from 3.0.0 to 3.0.18" } ] } } ] }, "vendor_name": "EC-CUBE CO.,LTD." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper restriction of rendered UI layers or frames in EC-CUBE versions from 3.0.0 to 3.0.18 leads to clickjacking attacks. If a user accesses a specially crafted page while logged into the administrative page, unintended operations may be conducted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Rendered UI Layers or Frames" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ec-cube.net/info/weakness/", "refsource": "MISC", "url": "https://www.ec-cube.net/info/weakness/" }, { "name": "https://jvn.jp/en/jp/JVN24457594/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN24457594/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5679", "datePublished": "2020-12-03T11:15:32", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:39:25.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5590
Vulnerability from cvelistv5
Published
2020-06-19 09:35
Modified
2024-08-04 08:30
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in EC-CUBE 3.0.0 to 3.0.18 and 4.0.0 to 4.0.3 allows remote authenticated attackers to delete arbitrary files and/or directories on the server via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://www.ec-cube.net/info/weakness/weakness.php?id=73 | x_refsource_MISC | |
https://www.ec-cube.net/info/weakness/weakness.php?id=74 | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN77458946/index.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | EC-CUBE CO.,LTD. | EC-CUBE |
Version: 3.0.0 to 3.0.18 and 4.0.0 to 4.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:30:24.521Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=73" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=74" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN77458946/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EC-CUBE", "vendor": "EC-CUBE CO.,LTD.", "versions": [ { "status": "affected", "version": "3.0.0 to 3.0.18 and 4.0.0 to 4.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in EC-CUBE 3.0.0 to 3.0.18 and 4.0.0 to 4.0.3 allows remote authenticated attackers to delete arbitrary files and/or directories on the server via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Directory traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-19T09:35:18", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=73" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=74" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN77458946/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5590", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EC-CUBE", "version": { "version_data": [ { "version_value": "3.0.0 to 3.0.18 and 4.0.0 to 4.0.3" } ] } } ] }, "vendor_name": "EC-CUBE CO.,LTD." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in EC-CUBE 3.0.0 to 3.0.18 and 4.0.0 to 4.0.3 allows remote authenticated attackers to delete arbitrary files and/or directories on the server via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Directory traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ec-cube.net/info/weakness/weakness.php?id=73", "refsource": "MISC", "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=73" }, { "name": "https://www.ec-cube.net/info/weakness/weakness.php?id=74", "refsource": "MISC", "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=74" }, { "name": "https://jvn.jp/en/jp/JVN77458946/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN77458946/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5590", "datePublished": "2020-06-19T09:35:19", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:30:24.521Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20751
Vulnerability from cvelistv5
Published
2021-06-28 00:50
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in EC-CUBE EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation.
References
▼ | URL | Tags |
---|---|---|
https://www.ec-cube.net/info/weakness/weakness.php?id=78 | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN95292458/index.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | EC-CUBE CO.,LTD. | EC-CUBE |
Version: EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.017Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=78" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN95292458/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EC-CUBE", "vendor": "EC-CUBE CO.,LTD.", "versions": [ { "status": "affected", "version": "EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series)" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in EC-CUBE EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-28T00:50:41", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=78" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN95292458/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20751", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EC-CUBE", "version": { "version_data": [ { "version_value": "EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series)" } ] } } ] }, "vendor_name": "EC-CUBE CO.,LTD." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in EC-CUBE EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ec-cube.net/info/weakness/weakness.php?id=78", "refsource": "MISC", "url": "https://www.ec-cube.net/info/weakness/weakness.php?id=78" }, { "name": "https://jvn.jp/en/jp/JVN95292458/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN95292458/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20751", "datePublished": "2021-06-28T00:50:41", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.017Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0808
Vulnerability from cvelistv5
Published
2014-01-22 21:00
Modified
2024-08-06 09:27
Severity ?
EPSS score ?
Summary
Authorization bypass through user-controlled key issue exists in EC-CUBE 2.11.0 through 2.12.2 and EC-Orange systems deployed before June 29th, 2015. If this vulnerability is exploited, a user of the affected shopping website may obtain other users' information by sending a crafted HTTP request.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | EC-CUBE CO.,LTD. | EC-CUBE |
Version: 2.11.0 through 2.12.2 |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2014-0808", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-11T14:04:20.266694Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-566", "description": "CWE-566 Authorization Bypass Through User-Controlled SQL Primary Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-11T14:07:16.517Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-06T09:27:20.153Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=57" }, { "tags": [ "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN51770585/" }, { "tags": [ "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000006" }, { "tags": [ "x_transferred" ], "url": "https://ec-orange.jp/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN15637138/" }, { "tags": [ "x_transferred" ], "url": "https://jvndb.jvn.jp/jvndb/JVNDB-2024-000054" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EC-CUBE", "vendor": "EC-CUBE CO.,LTD.", "versions": [ { "status": "affected", "version": "2.11.0 through 2.12.2" } ] }, { "product": "EC-Orange", "vendor": "S\u2011cubism Inc.", "versions": [ { "status": "affected", "version": "systems deployed before June 29th" }, { "status": "affected", "version": " 2015" } ] } ], "descriptions": [ { "lang": "en", "value": "Authorization bypass through user-controlled key issue exists in EC-CUBE 2.11.0 through 2.12.2 and EC-Orange systems deployed before June 29th, 2015. If this vulnerability is exploited, a user of the affected shopping website may obtain other users\u0027 information by sending a crafted HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-11T05:17:08.940Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=57" }, { "url": "http://jvn.jp/en/jp/JVN51770585/" }, { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000006" }, { "url": "https://ec-orange.jp/" }, { "url": "https://jvn.jp/en/jp/JVN15637138/" }, { "url": "https://jvndb.jvn.jp/jvndb/JVNDB-2024-000054" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2014-0808", "datePublished": "2014-01-22T21:00:00", "dateReserved": "2014-01-06T00:00:00", "dateUpdated": "2024-08-06T09:27:20.153Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }