The Cubecart::_basket method in classes/cubecart.class.php in CubeCart 5.0.0 through 5.2.0 allows remote attackers to unserialize arbitrary PHP objects via a crafted shipping parameter, as demonstrated by modifying the application configuration using the Config object.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
http://forums.cubecart.com/?showtopic=47026 | patch |
http://archives.neohapsis.com/archives/bugtraq/2013-02/0032.html | mailing list broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/81920 | vdb entry third party advisory |
http://karmainsecurity.com/KIS-2013-02 | exploit |
http://www.securityfocus.com/bid/57770 | vdb entry broken link |
http://packetstormsecurity.com/files/120094/CubeCart-5.2.0-PHP-Object-Injection.html | exploit vdb entry third party advisory |
http://secunia.com/advisories/52072 | third party advisory not applicable |
http://osvdb.org/89923 | vdb entry broken link |
http://www.exploit-db.com/exploits/24465 | exploit vdb entry third party advisory |