Vulnerability identifier: #VU44253
Vulnerability risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
CubeCart
Web applications /
CMS
Vendor: CubeCart
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple open redirect vulnerabilities in CubeCart 3.0.20 and earlier allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) r parameter to switch.php or (2) goto parameter to admin/login.php.
Mitigation
Install update from vendor's website.
Vulnerable software versions
CubeCart: 3.0.0 - 3.0.19
External links
https://archives.neohapsis.com/archives/bugtraq/2012-02/0058.html
https://osvdb.org/79140
https://osvdb.org/79141
https://www.openwall.com/lists/oss-security/2012/02/12/4
https://www.openwall.com/lists/oss-security/2012/02/13/5
https://www.openwall.com/lists/oss-security/2012/02/18/1
https://www.securityfocus.com/bid/51966
https://www.securitytracker.com/id?1026711
https://yehg.net/lab/pr0js/advisories/%5Bcubecart_3.0.20_3.0.x%5D_open_url_redirection
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.