Описание
Spree uses a hardcoded hash value
The session cookie store implementation in Spree 0.2.0 uses a hardcoded config.action_controller_session hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the config/environment.rb file.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-7311
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2008-7311.yml
- https://spreecommerce.com/blog/security-vulernability-session-cookie-store
- https://web.archive.org/web/20090306033106/http://support.spreehq.org/issues/show/63
- https://web.archive.org/web/20100309050152/http://rubygems.org/gems/spree/versions
- https://web.archive.org/web/20101128024939/http://spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-store
- http://spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-store
Пакеты
Наименование
spree
rubygems
Затронутые версииВерсия исправления
< 0.4.0
0.4.0
EPSS
Процентиль: 37%
0.00158
Низкий
CVE ID
Связанные уязвимости
nvd
почти 14 лет назад
The session cookie store implementation in Spree 0.2.0 uses a hardcoded config.action_controller_session hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the config/environment.rb file.
EPSS
Процентиль: 37%
0.00158
Низкий