File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 11---
22gem : spree
33cve : 2013-1656
4- osvdb : 91217
5- url : https://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
6- title : |
7- Spree payment_methods_controller.rb payment_method Parameter Arbitrary Ruby
8- Object Instantiation Command Execution
4+ url : https://blog.convisoappsec.com/en/spree-commerce-multiple-unsafe-reflection-vulnerabilities-cve-2013-1656
5+ title : Spree controller Parameter Arbitrary Ruby Object Instantiation Command Execution
96date : 2013-02-21
107description : |
11- Spree contains a flaw that is triggered when handling input passed via the
12- 'payment_method' parameter to payment_methods_controller.rb. This may allow
13- a remote authenticated attacker to instantiate arbitrary Ruby objects and
14- potentially execute arbitrary commands.
8+ Spree Commerce 1.0.x through 1.3.2 allows remote authenticated
9+ administrators to instantiate arbitrary Ruby objects and executd
10+ arbitrary commands via the
11+ (1) payment_method parameter to core/app/controllers/spree/admin/
12+ payment_methods_controller.rb; and the
13+ (2) promotion_action parameter to promotion_actions_controller.rb,
14+ (3) promotion_rule parameter to promotion_rules_controller.rb, and
15+ (4) calculator_type parameter to promotions_controller.rb in
16+ promo/app/controllers/spree/admin/, related to unsafe use
17+ of the constantize function.
1518cvss_v2 : 4.3
1619patched_versions :
17- - ' >= 2.0.0'
20+ - ' >= 2.0.0'
21+ related :
22+ url :
23+ - https://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
Load Diff This file was deleted.
Load Diff This file was deleted.
Load Diff This file was deleted.
You can’t perform that action at this time.
0 commit comments