ADVISORIES
GEM
SEVERITY
CVSS v3.x: 9.8 (Critical)
UNAFFECTED VERSIONS
- < 0.30.0.beta1
PATCHED VERSIONS
- >= 0.50.0
DESCRIPTION
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
RELATED
- https://nvd.nist.gov/vuln/detail/CVE-2011-10026
- https://github.com/spree
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb
- https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes
- https://www.exploit-db.com/exploits/17199
- https://www.vulncheck.com/advisories/spreecommerce-api-rce
- https://github.com/spree/spree/commit/0a9a360c590829d8a377ceae0cf997bbbbcc2df4
- https://github.com/spree/spree/commit/3b559e7219f3681184be409ad00cd34a34a37978
- https://github.com/advisories/GHSA-x485-rhg3-cqr4
