Summary
ionCube Loader is prone to multiple security vulnerabilities:
Impact
ionCube Loader is prone to the following security vulnerabilities:
1. A cross-site scripting vulnerbility
2. An information-disclosure vulnerabilities
3. An Arbitrary File Disclosure Vulnerability
Solution
Updates are available.
Insight
An attacker can exploit these issues to obtain potentially sensitive information, to view arbitrary files from the local filesystem and to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials to launch other attacks.
Affected
Versions prior to ionCube Loader 2.46 are vulnerable.
Detection
Send a crafted HTTP GET request and check the response.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 6.4
AV:N/AC:L/Au:N/C:P/I:N/A:P
Related Vulnerabilities
- Aker Secure Mail Gateway Cross-Site Scripting Vulnerability
- Apache Commons Daemon 'jsvc' Information Disclosure Vulnerability
- Apache ActiveMQ Source Code Information Disclosure Vulnerability
- Adiscon LogAnalyzer 'highlight' Parameter Cross Site Scripting Vulnerability
- 1024 CMS 1.1.0 Beta 'force_download.php' Local File Include Vulnerability