CVE-2015-5665

Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 2.11.0 through 2.13.3 allows remote attackers to hijack the authentication of arbitrary users for requests that write to PHP scripts, related to the doValidToken function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.12.5:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.12.6:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.13.0:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.13.1:*:*:*:*:*:*:*
cpe:2.3:a:lockon:ec-cube:2.13.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:33

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN97278546/index.html - Vendor Advisory () http://jvn.jp/en/jp/JVN97278546/index.html - Vendor Advisory
References () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000166 - Vendor Advisory () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000166 - Vendor Advisory
References () http://www.ec-cube.net/info/weakness/weakness.php?id=63 - Vendor Advisory () http://www.ec-cube.net/info/weakness/weakness.php?id=63 - Vendor Advisory
References () https://www.ec-cube.net/info/weakness/201510_01/ - Vendor Advisory () https://www.ec-cube.net/info/weakness/201510_01/ - Vendor Advisory

Information

Published : 2015-10-27 02:59

Updated : 2024-11-21 02:33


NVD link : CVE-2015-5665

Mitre link : CVE-2015-5665

CVE.ORG link : CVE-2015-5665


JSON object : View

Products Affected

lockon

  • ec-cube
CWE
CWE-352

Cross-Site Request Forgery (CSRF)