mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-12 02:04:49 +00:00
32 lines
1.1 KiB
JSON
32 lines
1.1 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2023-46845",
|
||
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||
|
"published": "2023-11-07T08:15:24.257",
|
||
|
"lastModified": "2023-11-07T12:14:36.923",
|
||
|
"vulnStatus": "Awaiting Analysis",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "EC-CUBE 3 series (3.0.0 to 3.0.18-p6) and 4 series (4.0.0 to 4.0.6-p3, 4.1.0 to 4.1.2-p2, and 4.2.0 to 4.2.2) contain an arbitrary code execution vulnerability due to improper settings of the template engine Twig included in the product. As a result, arbitrary code may be executed on the server where the product is running by a user with an administrative privilege."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {},
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://jvn.jp/en/jp/JVN29195731/",
|
||
|
"source": "vultures@jpcert.or.jp"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.ec-cube.net/info/weakness/20231026/index.php",
|
||
|
"source": "vultures@jpcert.or.jp"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.ec-cube.net/info/weakness/20231026/index_3.php",
|
||
|
"source": "vultures@jpcert.or.jp"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.ec-cube.net/info/weakness/20231026/index_40.php",
|
||
|
"source": "vultures@jpcert.or.jp"
|
||
|
}
|
||
|
]
|
||
|
}
|