CVE-2022-25355

EC-CUBE 3.0.0 to 3.0.18-p3 and EC-CUBE 4.0.0 to 4.1.1 improperly handle HTTP Host header values, which may lead a remote unauthenticated attacker to direct the vulnerable version of EC-CUBE to send an Email with some forged reissue-password URL to EC-CUBE users.
References
Link Resource
https://jvn.jp/en/jp/JVN53871926/index.html Third Party Advisory
https://www.ec-cube.net/info/weakness/20220221/ Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:-:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p1:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p2:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p3:*:*:*:*:*:*

History

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-862 CWE-913

04 Mar 2022, 16:31

Type Values Removed Values Added
References (MISC) https://www.ec-cube.net/info/weakness/20220221/ - (MISC) https://www.ec-cube.net/info/weakness/20220221/ - Mitigation, Vendor Advisory
References (MISC) https://jvn.jp/en/jp/JVN53871926/index.html - (MISC) https://jvn.jp/en/jp/JVN53871926/index.html - Third Party Advisory
CPE cpe:2.3:a:ec-cube:ec-cube:3.0.18:p3:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p1:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:-:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*
cpe:2.3:a:ec-cube:ec-cube:3.0.18:p2:*:*:*:*:*:*
CWE CWE-862
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3

24 Feb 2022, 16:02

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-24 15:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-25355

Mitre link : CVE-2022-25355

CVE.ORG link : CVE-2022-25355


JSON object : View

Products Affected

ec-cube

  • ec-cube
CWE
CWE-913

Improper Control of Dynamically-Managed Code Resources