7.5
CVSSv2

CVE-2013-3651

Published: 30/06/2013 Updated: 11/10/2013
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

LOCKON EC-CUBE 2.11.2 up to and including 2.12.4 allows remote malicious users to conduct unspecified PHP code-injection attacks via a crafted string, related to data/class/SC_CheckError.php and data/class/SC_FormParam.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

lockon ec-cube 2.12.3

lockon ec-cube 2.12.4

lockon ec-cube 2.11.5

lockon ec-cube 2.12.1

lockon ec-cube 2.11.2

lockon ec-cube 2.11.3

lockon ec-cube 2.11.4

lockon ec-cube 2.12.0

lockon ec-cube 2.12.2

Github Repositories

CVE-2013-3651 PoC - EC-CUBE 2

CVE-2013-3651 PoC - EC-CUBE 2 Using Require Python 3 Exec $ python poc_cve_2013_3651py <Target URL> - eg $ python poc_cve_2013_3651py 127001:9000/ Result: Vulnerable! PoC 脆弱性 | ECサイト構築・リニューアルは「ECオープンプラットフォームEC-CUBE」 wwwec-cubenet/info/wea