spreecommerce Spree 0.2.0

CPE Details

spreecommerce Spree 0.2.0
0.2.0
2010-11-18
18h47 +00:00
2010-11-19
17h31 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:spreecommerce:spree:0.2.0:*:*:*:*:*:*:*

Informations

Vendor

spreecommerce

Product

spree

Version

0.2.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2013-1656 2013-03-08 17h00 +00:00 Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.
4.3
CVE-2008-7310 2012-04-04 22h00 +00:00 Spree 0.2.0 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the Order state value and bypass the intended payment step via a modified URL, related to a "mass assignment" vulnerability.
5
CVE-2008-7311 2012-04-04 22h00 +00:00 The session cookie store implementation in Spree 0.2.0 uses a hardcoded config.action_controller_session hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the config/environment.rb file.
5