Published:2011/05/10  Last Updated:2011/05/10
      
        JVN#37878530
        EC-CUBE vulnerable to cross-site request forgery
              
      
      Overview
EC-CUBE provided by LOCKON CO.,LTD. contains a cross-site request forgery vulnerability.
Products Affected
- EC-CUBE versions prior to 2.11.0
 
Description
EC-CUBE provided by LOCKON CO.,LTD. is an open source system for creating shopping websites. EC-CUBE contains a cross-site request forgery vulnerability.
Impact
If a user views a malicious page while logged in, information stored within EC-CUBE may be altered.
Solution
Update the Software
Apply the latest update provided by the developer.
Vendor Status
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2011.05.10
| Measures | Conditions | Severity | 
|---|---|---|
| Access Required | can be attacked over the Internet using packets | 
                
  | 
            
| Authentication | anonymous or no authentication (IP addresses do not count) | 
                
  | 
            
| User Interaction Required | the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file | 
                
  | 
            
| Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) | 
                
  | 
            
Credit
Masako Oono reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert | |
| JPCERT Reports | |
| CERT Advisory | 
                                     | 
              
| CPNI Advisory | 
                                     | 
              
| TRnotes | 
                                     | 
              
| CVE | 
                                    CVE-2011-1325 | 
              
| JVN iPedia | 
                                    JVNDB-2011-000029 |