Sha256: 7c111178f3e186ddc146899403038824bd31ecae59665e5551e6d1e12362b76f

Contents?: true

Size: 598 Bytes

Versions: 6

Compression:

Stored size: 598 Bytes

Contents

---
gem: spree
cve: 2013-1656
osvdb: 91219
url: https://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
title: |
  Spree promotion_rules_controller.rb promotion_rule Parameter Arbitrary Ruby
  Object Instantiation Command Execution
date: 2013-02-21
description: |
  Spree contains a flaw that is triggered when handling input passed via the
  'promotion_rule' parameter to promotion_rules_controller.rb. This may allow
  a remote authenticated attacker to instantiate arbitrary Ruby objects and
  potentially execute arbitrary commands.
cvss_v2: 4.3
patched_versions:
  - ">= 2.0.0"

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/spree/OSVDB-91219.yml
bundler-budit-0.6.2 data/ruby-advisory-db/gems/spree/OSVDB-91219.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/spree/OSVDB-91219.yml
bundler-audit-0.6.1 data/ruby-advisory-db/gems/spree/OSVDB-91219.yml
bundler-audit-0.6.0 data/ruby-advisory-db/gems/spree/OSVDB-91219.yml
bundler-audit-0.5.0 data/ruby-advisory-db/gems/spree/OSVDB-91219.yml