// For flags

CVE-2013-1465

CubeCart 5.2.0 - 'cubecart.class.php' PHP Object Injection

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Cubecart::_basket method in classes/cubecart.class.php in CubeCart 5.0.0 through 5.2.0 allows remote attackers to unserialize arbitrary PHP objects via a crafted shipping parameter, as demonstrated by modifying the application configuration using the Config object.

El método _basket en /classes / cubecart.class.php en CubeCart v5.0.0 a través de v5.2.0 permite a atacantes remotos desserializar objetos PHP a través de un parámetro envío hecho a mano, como se ha demostrado mediante la modificación de la configuración de la aplicación mediante el objeto Config.

CubeCart versions 5.0.0 through 5.2.0 suffer from a PHP object injection vulnerability in cubecart.class.php.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-01-29 CVE Reserved
  • 2013-02-06 CVE Published
  • 2013-02-07 First Exploit
  • 2024-08-06 CVE Updated
  • 2024-09-08 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-502: Deserialization of Untrusted Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cubecart
Search vendor "Cubecart"
Cubecart
Search vendor "Cubecart" for product "Cubecart"
>= 5.0.0 <= 5.2.0
Search vendor "Cubecart" for product "Cubecart" and version " >= 5.0.0 <= 5.2.0"
-
Affected