Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m2jr-hmc3-qmpr

Опубликовано: 13 нояб. 2020
Источник: github
Github: Прошло ревью
CVSS3: 7.7

Описание

Authorization bypass in Spree

Impact

The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token

Patches

Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected.

References

Pull request with a fix and in-depth explanation - https://github.com/spree/spree/pull/10573

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

spree_api

rubygems
Затронутые версииВерсия исправления

>= 3.7.0, < 3.7.13

3.7.13

Наименование

spree_api

rubygems
Затронутые версииВерсия исправления

>= 4.0.0, < 4.0.5

4.0.5

Наименование

spree_api

rubygems
Затронутые версииВерсия исправления

>= 4.1.0, < 4.1.12

4.1.12

EPSS

Процентиль: 50%
0.00267
Низкий

7.7 High

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 7.7
nvd
около 5 лет назад

Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree from version 3.7 and before versions 3.7.13, 4.0.5, and 4.1.12, there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched in versions 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected.

EPSS

Процентиль: 50%
0.00267
Низкий

7.7 High

CVSS3

Дефекты

CWE-863