Описание
Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree from version 3.7 and before versions 3.7.13, 4.0.5, and 4.1.12, there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched in versions 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected.
Ссылки
- ExploitPatchThird Party Advisory
- Third Party Advisory
- Vendor Advisory
- ExploitPatchThird Party Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 3.7.0 (включая) до 3.7.13 (исключая)Версия от 4.0.0 (включая) до 4.0.5 (исключая)Версия от 4.1.0 (включая) до 4.1.12 (исключая)
Одно из
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*
EPSS
Процентиль: 50%
0.00267
Низкий
7.7 High
CVSS3
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-863
Связанные уязвимости
EPSS
Процентиль: 50%
0.00267
Низкий
7.7 High
CVSS3
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-863