Lucene search

K
jvnJapan Vulnerability NotesJVN:29195731
HistoryNov 07, 2023 - 12:00 a.m.

JVN#29195731: EC-CUBE 3 series and 4 series vulnerable to arbitrary code execution

2023-11-0700:00:00
Japan Vulnerability Notes
jvn.jp
17
ec-cube
arbitrary code execution
vulnerability
software update
template engine
administrative privilege
cwe-94
patches
workaround

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

44.8%

EC-CUBE 3 series and 4 series provided by EC-CUBE CO.,LTD. contain an arbitrary code execution vulnerability (CWE-94) due to improper settings of the product’s template engine “Twig”.

Impact

Arbitrary code may be executed on the server where the product is running by a user with an administrative privilege.

Solution

Update the software
Update the software according to the information provided by the developer.
The developer has released EC-CUBE 4.2.3 that addresses this vulnerability.

Apply the Workaround
The developer has released the patches for the users who cannot apply the update.
For more information, refer to the information provided by the developer.

Products Affected

  • EC-CUBE 4 series
    • EC-CUBE 4.0.0 to 4.0.6-p3
    • EC-CUBE 4.1.0 to 4.1.2-p2
    • EC-CUBE 4.2.0 to 4.2.2
  • EC-CUBE 3 series
    • EC-CUBE 3.0.0 to 3.0.18-p6

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

44.8%

Related for JVN:29195731