EC-CUBE 3 series (3.0.0 to 3.0.18-p6) and 4 series (4.0.0 to 4.0.6-p3, 4.1.0 to 4.1.2-p2, and 4.2.0 to 4.2.2) contain an arbitrary code execution vulnerability due to improper settings of the template engine Twig included in the product. As a result, arbitrary code may be executed on the server where the product is running by a user with an administrative privilege.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN29195731/ | Third Party Advisory |
https://www.ec-cube.net/info/weakness/20231026/index.php | Exploit Patch Vendor Advisory |
https://www.ec-cube.net/info/weakness/20231026/index_3.php | Exploit Patch Vendor Advisory |
https://www.ec-cube.net/info/weakness/20231026/index_40.php | Exploit Patch Vendor Advisory |
https://jvn.jp/en/jp/JVN29195731/ | Third Party Advisory |
https://www.ec-cube.net/info/weakness/20231026/index.php | Exploit Patch Vendor Advisory |
https://www.ec-cube.net/info/weakness/20231026/index_3.php | Exploit Patch Vendor Advisory |
https://www.ec-cube.net/info/weakness/20231026/index_40.php | Exploit Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/en/jp/JVN29195731/ - Third Party Advisory | |
References | () https://www.ec-cube.net/info/weakness/20231026/index.php - Exploit, Patch, Vendor Advisory | |
References | () https://www.ec-cube.net/info/weakness/20231026/index_3.php - Exploit, Patch, Vendor Advisory | |
References | () https://www.ec-cube.net/info/weakness/20231026/index_40.php - Exploit, Patch, Vendor Advisory |
15 Nov 2023, 15:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CPE | cpe:2.3:a:ec-cube:ec-cube:3.0.18:p3:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.0.6:p2:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:3.0.18:p5:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.1.2:p2:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.1.2:p1:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:3.0.18:p1:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:3.0.18:p4:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:3.0.18:p6:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.0.6:p1:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.0.6:p3:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:3.0.18:p2:*:*:*:*:*:* |
|
References | () https://www.ec-cube.net/info/weakness/20231026/index.php - Exploit, Patch, Vendor Advisory | |
References | () https://www.ec-cube.net/info/weakness/20231026/index_40.php - Exploit, Patch, Vendor Advisory | |
References | () https://www.ec-cube.net/info/weakness/20231026/index_3.php - Exploit, Patch, Vendor Advisory | |
References | () https://jvn.jp/en/jp/JVN29195731/ - Third Party Advisory | |
CWE | CWE-94 | |
First Time |
Ec-cube ec-cube
Ec-cube |
07 Nov 2023, 12:14
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-07 08:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-46845
Mitre link : CVE-2023-46845
CVE.ORG link : CVE-2023-46845
JSON object : View
Products Affected
ec-cube
- ec-cube
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')