EC-CUBE 3.0.0 to 3.0.18-p3 and EC-CUBE 4.0.0 to 4.1.1 improperly handle HTTP Host header values, which may lead a remote unauthenticated attacker to direct the vulnerable version of EC-CUBE to send an Email with some forged reissue-password URL to EC-CUBE users.
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ec-cube | Ec-cube | 3.0.0 (including) | 3.0.18 (excluding) |
Ec-cube | Ec-cube | 4.0.0 (including) | 4.1.1 (including) |
Ec-cube | Ec-cube | 3.0.18 (including) | 3.0.18 (including) |
Ec-cube | Ec-cube | 3.0.18-p1 (including) | 3.0.18-p1 (including) |
Ec-cube | Ec-cube | 3.0.18-p2 (including) | 3.0.18-p2 (including) |
Ec-cube | Ec-cube | 3.0.18-p3 (including) | 3.0.18-p3 (including) |