The Cubecart::_basket method in classes/cubecart.class.php in CubeCart 5.0.0 through 5.2.0 allows remote attackers to unserialize arbitrary PHP objects via a crafted shipping parameter, as demonstrated by modifying the application configuration using the Config object.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2013-02/0032.html | Broken Link |
http://forums.cubecart.com/?showtopic=47026 | Patch |
http://karmainsecurity.com/KIS-2013-02 | Exploit |
http://osvdb.org/89923 | Broken Link |
http://packetstormsecurity.com/files/120094/CubeCart-5.2.0-PHP-Object-Injection.html | Exploit Third Party Advisory VDB Entry |
http://secunia.com/advisories/52072 | Not Applicable |
http://www.exploit-db.com/exploits/24465 | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/57770 | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/81920 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2013-02-08 20:55
Updated : 2024-02-04 18:16
NVD link : CVE-2013-1465
Mitre link : CVE-2013-1465
CVE.ORG link : CVE-2013-1465
JSON object : View
Products Affected
cubecart
- cubecart
CWE
CWE-502
Deserialization of Untrusted Data