Published:2013/08/30 Last Updated:2013/08/30
JVN#15973066
EC-CUBE vulnerable to directory traversal when used in Windows
Overview
EC-CUBE contains a directory traversal vulnerability when used in Windows.
Products Affected
Versions listed below are vulnerable when used in Windows.
- EC-CUBE 2.12.0
- EC-CUBE 2.12.1
- EC-CUBE 2.12.2
- EC-CUBE 2.12.3
- EC-CUBE 2.12.3en
- EC-CUBE 2.12.3enP1
- EC-CUBE 2.12.3enP2
- EC-CUBE 2.12.4
- EC-CUBE 2.12.4en
- EC-CUBE 2.12.5
- EC-CUBE 2.12.5en
Description
EC-CUBE from LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a directory traversal vulnerability when used in Windows.
Impact
A remote attacker may obtain arbitrary files on the server.
Solution
Apply the update or patch
Apply the update or patch according to the information provided by the developer.
Vendor Status
| Vendor | Link |
| LOCKON CO.,LTD. | Directory traversal vulnerability when used in Windows |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2013.08.30
| Measures | Conditions | Severity |
|---|---|---|
| Access Required | can be attacked over the Internet using packets |
|
| Authentication | anonymous or no authentication (IP addresses do not count) |
|
| User Interaction Required | the vulnerability can be exploited without an honest user taking any action |
|
| Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Gen Sato reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert | |
| JPCERT Reports | |
| CERT Advisory |
|
| CPNI Advisory |
|
| TRnotes |
|
| CVE |
CVE-2013-4702 |
| JVN iPedia |
JVNDB-2013-000081 |