CVE-2013-1656
CVSS V2 Medium 4.3
CVSS V3 None
Description
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.
Overview
- CVE ID
- CVE-2013-1656
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2013-03-08T18:55:01
- Last Modified Date
- 2020-12-04T21:02:31
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:* | 1 | OR | 1.3.2 | |
cpe:2.3:a:spreecommerce:spree:1.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.0.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.0.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.0.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.0.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.0.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.0.7:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.1.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.1.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.1.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.1.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.1.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.1.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.1.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.2.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.2.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.2.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.2.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.2.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.3.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:spreecommerce:spree:1.3.1:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 4.3
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 2.9
References
Reference URL | Reference Tags |
---|---|
http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html | |
http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed | Vendor Advisory |
https://www.conviso.com.br/advisories/CVE-2013-1656.txt | Exploit |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2013-1656 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1656 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 07:31:12 | Added to TrackCVE |