classes/admin.class.php in CubeCart 5.2.12 through 5.2.16 and 6.x before 6.0.7 does not properly validate that a password reset request was made, which allows remote attackers to change the administrator password via a recovery request with a space character in the validate parameter and the administrator email in the email parameter.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://forums.cubecart.com/topic/50277-critical-security-issue-admin-account-hijack/ | patch vendor advisory |
http://seclists.org/fulldisclosure/2015/Sep/40 | mailing list exploit |
http://packetstormsecurity.com/files/133535/CubeCart-6.0.6-Administrative-Bypass.html | exploit |
http://www.securitytracker.com/id/1034015 | vdb entry |