Vulnerability Description
An issue was discovered in OXID eShop Enterprise Edition before 5.3.8, 6.0.x before 6.0.3, and 6.1.x before 6.1.0; Professional Edition before 4.10.8, 5.x and 6.0.x before 6.0.3, and 6.1.x before 6.1.0; and Community Edition before 4.10.8, 5.x and 6.0.x before 6.0.3, and 6.1.x before 6.1.0. An attacker could gain access to the admin panel or a customer account when using the password reset function. To do so, it is required to own a domain name similar to the one the victim uses for their e-mail accounts.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oxid-Esales | Eshop | <= 4.10.7 |
Related Weaknesses (CWE)
References
- https://bugs.oxid-esales.com/view.php?id=6818Vendor Advisory
- https://oxidforge.org/en/security-bulletin-2018-002.htmlPatchThird Party Advisory
- https://bugs.oxid-esales.com/view.php?id=6818Vendor Advisory
- https://oxidforge.org/en/security-bulletin-2018-002.htmlPatchThird Party Advisory
FAQ
What is CVE-2018-12579?
CVE-2018-12579 is a vulnerability with a CVSS score of 8.1 (HIGH). An issue was discovered in OXID eShop Enterprise Edition before 5.3.8, 6.0.x before 6.0.3, and 6.1.x before 6.1.0; Professional Edition before 4.10.8, 5.x and 6.0.x before 6.0.3, and 6.1.x before 6.1....
How severe is CVE-2018-12579?
CVE-2018-12579 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-12579?
Check the references section above for vendor advisories and patch information. Affected products include: Oxid-Esales Eshop.