
JPCERT-AT-2021-0022
JPCERT/CC
2021-05-10
I. Overview
On May 7, 2021, EC-CUBE CO.,LTD. has released an alert regarding a cross site scripting vulnerability (CVE-2021-20717) in EC-CUBE. By leveraging the vulnerability, a remote attacker may execute arbitrary script on the site administrator’s web browser, resulting in unauthorized access to the vulnerable site or personal information leakage. EC-CUBE CO.,LTD. has confirmed attacks that exploit this vulnerability.
EC-CUBE 4.0.x: Alert Regarding Cross Site Scripting Vulnerability (Japanese)
https://www.ec-cube.net/info/weakness/20210507/
Since attacks that exploit the vulnerability have already been confirmed,users of the affected products are recommended to take measures such as applying patches as soon as possible. For more information, please refer to the information provided by EC-CUBE CO.,LTD..For countermeasures, please consider contacting the contractor in charge of construction of the site as responding to the vulnerability.
II. Affected Products and Versions
Affected products and versions are as follows.
– EC-CUBE version from 4.0.0 to 4.0.5
III. Solution
EC-CUBE CO.,LTD. released a patch and version that address the vulnerability. Please consider applying the patch or version by referring to the information published by EC-CUBE CO.,LTD..
– EC-CUBE version 4.0.5-p1
In addition, for users who customize the original source code of EC-CUBE, the code difference and information on precautions when applying the update have been provided.
Countermeasure method 2: Manually updating by checking the difference (Japanese)
https://www.ec-cube.net/info/weakness/20210507/#diff
IV. Compromise Investigation
EC Cube Co., Ltd. has provided information on how to check if attack exploiting this vulnerability has been performed, which is by checking data within order and member information.
How to check the attack (Japanese)
https://www.ec-cube.net/info/weakness/20210507/#check
V. References
EC-CUBE CO.,LTD.
[Important] Request to respond to the vulnerability of “high” urgency in EC-CUBE 4.0 series (updated 2021/5/10 9:00) (2021/05/07) (Japanese)
https://www.ec-cube.net/news/detail.php?news_id=383
EC-CUBE CO.,LTD.
Released “EC-CUBE 4.0.5-p1” that addressed the vulnerability (2021/05/10) (Japanese)
https://www.ec-cube.net/news/detail.php?news_id=384
Japan Vulnerability Notes JVN#97554111
Cross Site Scripting Vulnerability in EC-CUBE (Japanese)
https://jvn.jp/jp/JVN97554111/
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/
The post Security Alert: Alert Regarding Cross Site Scripting Vulnerability (CVE-2021-20717) in EC-CUBE appeared first on Malware Devil.
https://malwaredevil.com/2021/05/10/security-alert-alert-regarding-cross-site-scripting-vulnerability-cve-2021-20717-in-ec-cube/?utm_source=rss&utm_medium=rss&utm_campaign=security-alert-alert-regarding-cross-site-scripting-vulnerability-cve-2021-20717-in-ec-cube
No comments:
Post a Comment