Directory traversal vulnerability in LOCKON EC-CUBE 2.12.0 through 2.12.4 allows remote attackers to read arbitrary image files via vectors related to data/class/SC_CheckError.php and data/class/SC_FormParam.php, a different vulnerability than CVE-2013-3650.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000065 | third party advisory |
http://www.ec-cube.net/info/weakness/20130626/index.php | |
http://jvn.jp/en/jp/JVN04161229/index.html | third party advisory |
http://www.ec-cube.net/info/weakness/weakness.php?id=45 | vendor advisory |
http://svn.ec-cube.net/open_trac/changeset/22891 | vendor advisory |