cvelist/2024/41xxx/CVE-2024-41141.json
2024-07-30 09:00:32 +00:00

79 lines
2.9 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-41141",
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stored cross-site scripting vulnerability exists in EC-CUBE Web API Plugin. When there are multiple users using OAuth Management feature and one of them inputs some crafted value on the OAuth Management page, an arbitrary script may be executed on the web browser of the other user who accessed the management page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "EC-CUBE CO.,LTD.",
"product": {
"product_data": [
{
"product_name": "EC-CUBE Web API Plugin",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.0 and 2.1.0 to 2.1.3 (for EC-CUBE 4.0/4.1 series)"
}
]
}
},
{
"product_name": "EC-CUBE Web API Plugin (4.2 series)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.2.0 to 4.2.3 (for EC-CUBE 4.2 series)"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.ec-cube.net/info/weakness/20240701/web_api_plugin.php",
"refsource": "MISC",
"name": "https://www.ec-cube.net/info/weakness/20240701/web_api_plugin.php"
},
{
"url": "https://jvn.jp/en/jp/JVN26225832/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN26225832/"
}
]
}
}