First published: Thu Feb 24 2022(Updated: )
EC-CUBE 3.0.0 to 3.0.18-p3 and EC-CUBE 4.0.0 to 4.1.1 improperly handle HTTP Host header values, which may lead a remote unauthenticated attacker to direct the vulnerable version of EC-CUBE to send an Email with some forged reissue-password URL to EC-CUBE users.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
EC-CUBE EC-CUBE | >=3.0.0<3.0.18 | |
EC-CUBE EC-CUBE | >=4.0.0<=4.1.1 | |
EC-CUBE EC-CUBE | =3.0.18 | |
EC-CUBE EC-CUBE | =3.0.18-p1 | |
EC-CUBE EC-CUBE | =3.0.18-p2 | |
EC-CUBE EC-CUBE | =3.0.18-p3 | |
composer/ec-cube/ec-cube | >=4.0.0<=4.1.1 | 4.1.2 |
composer/ec-cube/ec-cube | >=3.0.0<=3.0.18-p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this EC-CUBE vulnerability is CVE-2022-25355.
EC-CUBE 3.0.0 to 3.0.18-p3 and EC-CUBE 4.0.0 to 4.1.1 are affected by this vulnerability.
The severity of CVE-2022-25355 is medium with a severity value of 5.3.
This vulnerability in EC-CUBE allows a remote unauthenticated attacker to direct the vulnerable version of EC-CUBE to send an Email with a forged reissue-password URL to EC-CUBE users.
To fix CVE-2022-25355, update your EC-CUBE software to version 3.0.18-p4 for EC-CUBE 3.x or version 4.2.0 or later for EC-CUBE 4.x.