Multiple directory traversal vulnerabilities in the doApiAction function in data/class/api/SC_Api_Operation.php in LOCKON EC-CUBE 2.12.0 up to and including 2.12.5 on Windows allow remote malicious users to read arbitrary files via vectors involving a (1) Operation, (2) Service, (3) Style, (4) Validate, or (5) Version value.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
lockon ec-cube 2.12.2 |
||
lockon ec-cube 2.12.3 |
||
lockon ec-cube 2.12.5 |
||
lockon ec-cube 2.12.5en |
||
lockon ec-cube 2.12.4 |
||
lockon ec-cube 2.12.0 |
||
lockon ec-cube 2.12.1 |
||
lockon ec-cube 2.12.4en |
||
lockon ec-cube 2.12.3en |
||
lockon ec-cube 2.12.3enp1 |
||
lockon ec-cube 2.12.3enp2 |