漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
CubeCart: Pre-Authenticated Password Reset Link Poisoning via HTTP Host Header
Vulnerability Description
CubeCart is an ecommerce software solution. Prior to 6.7.2, CubeCart 6.6.x – 6.7.1 builds CC_STORE_URL directly from the Host request header at bootstrap, with no allowlist. The constant is embedded verbatim into transactional email links, most critically the password-reset link in User::passwordRequest() (and the admin equivalent in Admin::passwordRequest()). An unauthenticated attacker who knows a target email can POST /index.php?_a=recover with Host: evil.com; CubeCart writes a fresh verify token (valid 3,600 s) and emails the victim a link http://evil.com/index.php?_a=recovery&validate=<TOKEN>. The token is valid against the legitimate store — capturing the victim's click on evil.com yields full account takeover, or store takeover when an admin email is targeted. This vulnerability is fixed in 6.7.2.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Vulnerability Type
输入验证不恰当
Vulnerability Title
CubeCart 输入验证错误漏洞
Vulnerability Description
CubeCart是CubeCart开源的一个电子商务软件。 CubeCart 6.6.x至6.7.1版本存在输入验证错误漏洞,该漏洞源于从Host请求头直接构建CC_STORE_URL常量并嵌入交易邮件链接,可能导致账户接管。
CVSS Information
N/A
Vulnerability Type
N/A