CVE-2013-1656
08.03.2013, 18:55
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.Enginsight
Vendor | Product | Version |
---|---|---|
spreecommerce | spree | 𝑥 ≤ 1.3.2 |
spreecommerce | spree | 1.0.0 |
spreecommerce | spree | 1.0.1 |
spreecommerce | spree | 1.0.2 |
spreecommerce | spree | 1.0.3 |
spreecommerce | spree | 1.0.4 |
spreecommerce | spree | 1.0.5 |
spreecommerce | spree | 1.0.6 |
spreecommerce | spree | 1.0.7 |
spreecommerce | spree | 1.1.0 |
spreecommerce | spree | 1.1.1 |
spreecommerce | spree | 1.1.2 |
spreecommerce | spree | 1.1.3 |
spreecommerce | spree | 1.1.4 |
spreecommerce | spree | 1.1.5 |
spreecommerce | spree | 1.1.6 |
spreecommerce | spree | 1.2.0 |
spreecommerce | spree | 1.2.1 |
spreecommerce | spree | 1.2.2 |
spreecommerce | spree | 1.2.3 |
spreecommerce | spree | 1.2.4 |
spreecommerce | spree | 1.3.0 |
spreecommerce | spree | 1.3.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References