First published: Mon Sep 28 2015(Updated: )
classes/admin.class.php in CubeCart 5.2.12 through 5.2.16 and 6.x before 6.0.7 does not properly validate that a password reset request was made, which allows remote attackers to change the administrator password via a recovery request with a space character in the validate parameter and the administrator email in the email parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cubecart Cubecart | =5.2.12 | |
Cubecart Cubecart | =5.2.13 | |
Cubecart Cubecart | =5.2.14 | |
Cubecart Cubecart | =5.2.15 | |
Cubecart Cubecart | =6.0.0 | |
Cubecart Cubecart | =6.0.1 | |
Cubecart Cubecart | =6.0.2 | |
Cubecart Cubecart | =6.0.3 | |
Cubecart Cubecart | =6.0.4 | |
Cubecart Cubecart | =6.0.5 | |
Cubecart Cubecart | =6.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6928 has a moderate severity rating due to the potential for remote administrative access through unauthenticated password reset requests.
To fix CVE-2015-6928, upgrade to CubeCart version 6.0.7 or later, where the password reset mechanism has been properly validated.
CVE-2015-6928 affects CubeCart versions 5.2.12 to 5.2.16, and all 6.x versions before 6.0.7.
CVE-2015-6928 is an unauthorized access vulnerability that allows attackers to change administrator passwords.
Yes, CVE-2015-6928 can be easily exploited by sending a specially crafted password reset request with a space character in the validate parameter.