Описание
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
Ссылки
- Product
- ExploitThird Party Advisory
- Vendor Advisory
- ExploitVDB Entry
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.50.1 (исключая)
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.64724
Средний
9.8 Critical
CVSS3
Дефекты
CWE-78
CWE-78
Связанные уязвимости
EPSS
Процентиль: 98%
0.64724
Средний
9.8 Critical
CVSS3
Дефекты
CWE-78
CWE-78