EC-CUBE 3 series (3.0.0 to 3.0.18-p6) and 4 series (4.0.0 to 4.0.6-p3, 4.1.0 to 4.1.2-p2, and 4.2.0 to 4.2.2) contain an arbitrary code execution vulnerability due to improper settings of the template engine Twig included in the product. As a result, arbitrary code may be executed on the server where the product is running by a user with an administrative privilege.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN29195731/ | Third Party Advisory |
https://www.ec-cube.net/info/weakness/20231026/index.php | Exploit Patch Vendor Advisory |
https://www.ec-cube.net/info/weakness/20231026/index_3.php | Exploit Patch Vendor Advisory |
https://www.ec-cube.net/info/weakness/20231026/index_40.php | Exploit Patch Vendor Advisory |
https://jvn.jp/en/jp/JVN29195731/ | Third Party Advisory |
https://www.ec-cube.net/info/weakness/20231026/index.php | Exploit Patch Vendor Advisory |
https://www.ec-cube.net/info/weakness/20231026/index_3.php | Exploit Patch Vendor Advisory |
https://www.ec-cube.net/info/weakness/20231026/index_40.php | Exploit Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-07 08:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-46845
Mitre link : CVE-2023-46845
CVE.ORG link : CVE-2023-46845
JSON object : View
Products Affected
ec-cube
- ec-cube
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')