Miggo Logo

CVE-2020-5679:
EC-CUBE Improper Restriction of Rendered UI Layers or Frames

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.42124%
Published
5/24/2022
Updated
4/25/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
ec-cube/ec-cubecomposer>= 3.0.0, <= 3.0.18

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing X-Frame-Options or Content-Security-Policy headers in admin page responses, which would typically be controlled by framework-level security configurations or middleware rather than specific userland functions. However, without access to EC-CUBE's source code, commit diffs, or patch details, we cannot definitively identify the exact functions/file paths responsible for rendering admin pages or setting security headers. The vulnerability is architectural (missing security headers) rather than tied to a specific business logic function. This analysis is based on: 1) The CWE-1021 pattern of missing frame protection headers 2) EC-CUBE being a Symfony-based PHP application where headers would typically be set in controllers or middleware 3) The advisory's description matching clickjacking via unprotected admin interfaces.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Improp*r r*stri*tion o* r*n**r** UI l*y*rs or *r*m*s in **-*U** v*rsions *rom *.*.* to *.*.** l***s to *li*kj**kin* *tt**ks. I* * us*r ****ss*s * sp**i*lly *r**t** p*** w*il* lo**** into t** **ministr*tiv* p***, unint*n*** op*r*tions m*y ** *on*u*t**

Reasoning

T** vuln*r**ility st*ms *rom missin* X-*r*m*-Options or *ont*nt-S**urity-Poli*y *****rs in **min p*** r*spons*s, w*i** woul* typi**lly ** *ontroll** *y *r*m*work-l*v*l s**urity *on*i*ur*tions or mi**l*w*r* r*t**r t**n sp**i*i* us*rl*n* `*un*tions`. *