CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
EPSS
Percentile
49.9%
AdvancePro Technologies Advanceware software suite contains a privilege bypass vulnerability, resulting in information leakage (CWE-200).
CWE-200: Information Exposure
AdvancePro Technologies Advanceware software suite contains a privilege bypass vulnerability, resulting in information leakage. The id
value in the vulnerable site URL can be manipulated to show the contents of orders from other users. This may contain contact information for the customers, shipping information, and order details.
A remote authenticated attacker can manipulate the webserver URL of the vulnerable site running the Advanceware software suite, which could be used to result in information leakage.
AdvancePro has updated the software suite to mitigate this vulnerability. Customers that created/updated their AdvancePro website template after July 26, 2013 have already had a fix applied and are not susceptible to this vulnerability. Sites that run the Legacy Template from AdvanceWare or created/updated their sites prior to July 26, 2013 are strongly encouraged to move to the new template. All sites are set to be automatically patched in a timely manner. Customers can request a status update or schedule a patch by contacting [email protected] or by visiting the AdvancePro Technologies website and accessing their customer support ticket portal.
Further details can also be found on the AdvancePro Technologies blog.
704526
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: July 26, 2013 Updated: September 10, 2013
Affected
We have not received a statement from the vendor.
AdvancePro Technologies has provided additional information on their blog, linked below.
Group | Score | Vector |
---|---|---|
Base | 7.5 | AV:N/AC:L/Au:S/C:C/I:P/A:N |
Temporal | 6.2 | E:F/RL:OF/RC:C |
Environmental | 1.6 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND |
Thanks to the reporter that wishes to remain anonymous.
This document was written by Adam Rauf.
CVE IDs: | CVE-2013-3596 |
---|---|
Date Public: | 2013-09-03 Date First Published: |