Sha256: f05b5974c7addbc302110fdaf0af1ec667b59521647255685024bac31466e2f9

Contents?: true

Size: 590 Bytes

Versions: 6

Compression:

Stored size: 590 Bytes

Contents

---
gem: spree
cve: 2013-1656
osvdb: 91218
url: https://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
title: |
  Spree promotions_controller.rb calculator_type Parameter Arbitrary Ruby
  Object Instantiation Command Execution
date: 2013-02-21
description: |
  Spree contains a flaw that is triggered when handling input passed via the
  'calculator_type' parameter to promotions_controller.rb. This may allow a
  remote authenticated attacker to instantiate arbitrary Ruby objects and
  potentially execute arbitrary commands.
cvss_v2: 4.3
patched_versions:
  - ">= 2.0.0"

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/spree/OSVDB-91218.yml
bundler-budit-0.6.2 data/ruby-advisory-db/gems/spree/OSVDB-91218.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/spree/OSVDB-91218.yml
bundler-audit-0.6.1 data/ruby-advisory-db/gems/spree/OSVDB-91218.yml
bundler-audit-0.6.0 data/ruby-advisory-db/gems/spree/OSVDB-91218.yml
bundler-audit-0.5.0 data/ruby-advisory-db/gems/spree/OSVDB-91218.yml