---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: EC-CUBE Multiple Vulnerabilities SECUNIA ADVISORY ID: SA32065 VERIFY ADVISORY: http://secunia.com/advisories/32065/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting, Manipulation of data, Exposure of sensitive information WHERE: >From remote SOFTWARE: EC-CUBE 2.x http://secunia.com/advisories/product/20011/ EC-CUBE 1.x http://secunia.com/advisories/product/12657/ DESCRIPTION: Multiple vulnerabilities have been reported in EC-CUBE, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. 1) Unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. 2) Unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerabilities are reported in the following versions: - Ver2 Version 2.1.2a and earlier - Ver2 RC Version 2.3.0-rc1 and earlier - Ver2 Beta(RC) Version 2.2.0-beta and earlier - Ver2 Beta(RC) Version 2.1.1-beta and earlier - Ver1 Version 1.4.6 and earlier - Ver1 Beta Version 1.5.0-beta and earlier - Community Edition 1.3.4 and earlier - Community Edition Nightly-Build r17319 and earlier - Community Edition Nightly-Build r17336 and earlier - Community Edition Nightly-Build r17623 and earlier SOLUTION: The vendor has released updated versions: http://www.ec-cube.net/download/index.php PROVIDED AND/OR DISCOVERED BY: 1) JVN credits Yuya Yoshida of Mitsui Bussan Secure Directions, Naruhisa Tadokoro of Kobe Digital Labo Inc, and Masako Oono of NetAgent Co. Ltd. ORIGINAL ADVISORY: http://jvn.jp/en/jp/JVN81111541/index.html http://jvn.jp/en/jp/JVN99916563/index.html http://jvn.jp/en/jp/JVN36085487/index.html http://jvn.jp/en/jp/JVN26621646/index.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------