Sha256: c3cbd9439ecd546654503de3f03de6551e8869da0d21e796061f3ffd5508a885

Contents?: true

Size: 598 Bytes

Versions: 6

Compression:

Stored size: 598 Bytes

Contents

---
gem: spree
cve: 2013-1656
osvdb: 91217
url: https://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
title: |
  Spree payment_methods_controller.rb payment_method Parameter Arbitrary Ruby
  Object Instantiation Command Execution
date: 2013-02-21
description: |
  Spree contains a flaw that is triggered when handling input passed via the
  'payment_method' parameter to payment_methods_controller.rb. This may allow
  a remote authenticated attacker to instantiate arbitrary Ruby objects and
  potentially execute arbitrary commands.
cvss_v2: 4.3
patched_versions:
  - ">= 2.0.0"

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/spree/OSVDB-91217.yml
bundler-budit-0.6.2 data/ruby-advisory-db/gems/spree/OSVDB-91217.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/spree/OSVDB-91217.yml
bundler-audit-0.6.1 data/ruby-advisory-db/gems/spree/OSVDB-91217.yml
bundler-audit-0.6.0 data/ruby-advisory-db/gems/spree/OSVDB-91217.yml
bundler-audit-0.5.0 data/ruby-advisory-db/gems/spree/OSVDB-91217.yml