7.5

CVE-2017-12415

Exploit
OXID eShop Community Edition before 6.0.0 RC2 (development), 4.10.x before 4.10.5 (maintenance), and 4.9.x before 4.9.10 (legacy), Enterprise Edition before 6.0.0 RC2 (development), 5.2.x before 5.2.10 (legacy), and 5.3.x before 5.3.5 (maintenance), and Professional Edition before 6.0.0 RC2 (development), 4.9.x before 4.9.10 (legacy) and 4.10.x before 4.10.5 (maintenance) allow remote attackers to hijack the cart session of a client via Cross-Site Request Forgery (CSRF) if the following pre-conditions are met: (1) the attacker knows which shop is presently used by the client, (2) the attacker knows the exact time when the customer will add product items to the cart, (3) the attacker knows which product items are already in the cart (has to know their article IDs), and (4) the attacker would be able to trick user into clicking a button (submit form) of an e-mail or remote site within the period of visiting the shop and placing an order.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Oxid-esalesEshop SwEditioncommunity Version >= 4.9.0 < 4.9.10
Oxid-esalesEshop SwEditionprofessional Version >= 4.9.0 < 4.9.10
Oxid-esalesEshop SwEditioncommunity Version >= 4.10.0 < 4.10.5
Oxid-esalesEshop SwEditionprofessional Version >= 4.10.0 < 4.10.5
Oxid-esalesEshop SwEditionenterprise Version >= 5.2.0 < 5.2.10
Oxid-esalesEshop SwEditionenterprise Version >= 5.3.0 < 5.3.5
Oxid-esalesEshop Version6.0.0 Updaterc1 SwEditioncommunity
Oxid-esalesEshop Version6.0.0 Updaterc1 SwEditionenterprise
Oxid-esalesEshop Version6.0.0 Updaterc1 SwEditionprofessional
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.35% 0.572
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 1.6 5.9
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 5.1 4.9 6.4
AV:N/AC:H/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.