Published:2018/08/09  Last Updated:2018/08/09

JVN#06372244
Multiple vulnerabilities in EC-CUBE Payment Module and GMO-PG Payment Module (PG Multi-Payment Service) for EC-CUBE

Overview

EC-CUBE Payment Module and GMO-PG Payment Module (PG Multi-Payment Service) for EC-CUBE provided by GMO Payment Gateway, Inc. contain multiple vulnerabilities.

Products Affected

  • EC-CUBE Payment Module (2.12) version 3.5.23 and earlier
  • EC-CUBE Payment Module (2.11) version 2.3.17 and earlier
  • GMO-PG Payment Module (PG Multi-Payment Service) (2.12) version 3.5.23 and earlier
  • GMO-PG Payment Module (PG Multi-Payment Service) (2.11) version 2.3.17 and earlier

Description

EC-CUBE Payment Module and GMO-PG Payment Module (PG Multi-Payment Service), which are additional modules for EC-CUBE, provided by GMO Payment Gateway, Inc. contain multiple vulnerabilities listed below.

  • Cross-site scripting vulnerability in the management screen (CWE-79) - CVE-2018-0657
    CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Base Score: 6.1
    CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6
  • Input validation bypass vulnerability in the management screen (CWE-20) - CVE-2018-0658
    CVSS v3 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L Base Score: 3.8
    CVSS v2 AV:N/AC:M/Au:S/C:N/I:P/A:N Base Score: 3.5

Impact

  • An arbitrary script may be executed on the web browser of an administrator logged into the EC-CUBE management screen - CVE-2018-0657
  • An arbitrary PHP code may be executed on the server by an administrator logged into the EC-CUBE management screen - CVE-2018-0658
When the two vulnerabilities are combined, an arbitrary PHP code may be executed on the server, if an administrator logged into the EC-CUBE management screen accesses a malicious URL.

Solution

Update the software
Update to the latest version according to the information provided by the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
GMO Payment Gateway, Inc. Vulnerable 2018/08/09

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2018-0657
CVE-2018-0658
JVN iPedia JVNDB-2018-000086