Skip to content

Spree Improper Input Validation vulnerability

Moderate severity GitHub Reviewed Published Oct 24, 2017 to the GitHub Advisory Database • Updated Nov 5, 2023

Package

bundler spree (RubyGems)

Affected versions

>= 1.0.0, < 2.0.0.rc1

Patched versions

2.0.0.rc1

Description

Spree Commerce 1.0.x before 2.0.0.rc1 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.

References

Published by the National Vulnerability Database Mar 8, 2013
Published to the GitHub Advisory Database Oct 24, 2017
Reviewed Jun 16, 2020
Last updated Nov 5, 2023

Severity

Moderate

EPSS score

0.292%
(70th percentile)

Weaknesses

CVE ID

CVE-2013-1656

GHSA ID

GHSA-jxx8-v83v-rhw3

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.