CVE-2023-46845

EC-CUBE 3 series (3.0.0 to 3.0.18-p6) and 4 series (4.0.0 to 4.0.6-p3, 4.1.0 to 4.1.2-p2, and 4.2.0 to 4.2.2) contain an arbitrary code execution vulnerability due to improper settings of the template engine Twig included in the product. As a result, arbitrary code may be executed on the server where the product is running by a user with an administrative privilege.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p1:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p2:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p3:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p4:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p5:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p6:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:4.0.6:p1:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:4.0.6:p2:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:4.0.6:p3:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:4.1.2:p1:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:4.1.2:p2:*:*:*:*:*:*

History

21 Nov 2024, 08:29

Type Values Removed Values Added
References () https://jvn.jp/en/jp/JVN29195731/ - Third Party Advisory () https://jvn.jp/en/jp/JVN29195731/ - Third Party Advisory
References () https://www.ec-cube.net/info/weakness/20231026/index.php - Exploit, Patch, Vendor Advisory () https://www.ec-cube.net/info/weakness/20231026/index.php - Exploit, Patch, Vendor Advisory
References () https://www.ec-cube.net/info/weakness/20231026/index_3.php - Exploit, Patch, Vendor Advisory () https://www.ec-cube.net/info/weakness/20231026/index_3.php - Exploit, Patch, Vendor Advisory
References () https://www.ec-cube.net/info/weakness/20231026/index_40.php - Exploit, Patch, Vendor Advisory () https://www.ec-cube.net/info/weakness/20231026/index_40.php - Exploit, Patch, Vendor Advisory

15 Nov 2023, 15:21

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:a:ec-cube:ec-cube:3.0.18:p3:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:4.0.6:p2:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p5:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:4.1.2:p2:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:4.1.2:p1:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p1:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p4:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p6:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:4.0.6:p1:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:4.0.6:p3:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p2:*:*:*:*:*:*
References () https://www.ec-cube.net/info/weakness/20231026/index.php - () https://www.ec-cube.net/info/weakness/20231026/index.php - Exploit, Patch, Vendor Advisory
References () https://www.ec-cube.net/info/weakness/20231026/index_40.php - () https://www.ec-cube.net/info/weakness/20231026/index_40.php - Exploit, Patch, Vendor Advisory
References () https://www.ec-cube.net/info/weakness/20231026/index_3.php - () https://www.ec-cube.net/info/weakness/20231026/index_3.php - Exploit, Patch, Vendor Advisory
References () https://jvn.jp/en/jp/JVN29195731/ - () https://jvn.jp/en/jp/JVN29195731/ - Third Party Advisory
CWE CWE-94
First Time Ec-cube ec-cube
Ec-cube

07 Nov 2023, 12:14

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-07 08:15

Updated : 2024-11-21 08:29


NVD link : CVE-2023-46845

Mitre link : CVE-2023-46845

CVE.ORG link : CVE-2023-46845


JSON object : View

Products Affected

ec-cube

  • ec-cube
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')