File tree Expand file tree Collapse file tree 2 files changed +59
-0
lines changed Expand file tree Collapse file tree 2 files changed +59
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ gem : rd_searchlogic
3+ cve : 2011-10026
4+ ghsa : x485-rhg3-cqr4
5+ url : https://github.com/advisories/GHSA-x485-rhg3-cqr4
6+ title : Spree Commerce is vulnerable to RCE through Search API
7+ date : 2025-08-20
8+ description : |
9+ Spreecommerce versions prior to 0.50.x contain a remote command
10+ execution vulnerability in the API's search functionality. Improper
11+ input sanitation allows attackers to inject arbitrary shell commands
12+ via the search[instance_eval] parameter, which is dynamically invoked
13+ using Ruby’s send method. This flaw enables unauthenticated attackers
14+ to execute commands on the server.
15+ cvss_v3 : 9.8
16+ cvss_v4 : 9.3
17+ notes : Never patched
18+ related :
19+ url :
20+ - https://nvd.nist.gov/vuln/detail/CVE-2011-10026
21+ - https://github.com/spree
22+ - https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb
23+ - https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes
24+ - https://www.exploit-db.com/exploits/17199
25+ - https://www.vulncheck.com/advisories/spreecommerce-api-rce
26+ - https://github.com/spree/spree/commit/0a9a360c590829d8a377ceae0cf997bbbbcc2df4
27+ - https://github.com/spree/spree/commit/3b559e7219f3681184be409ad00cd34a34a37978
28+ - https://github.com/advisories/GHSA-x485-rhg3-cqr4
Original file line number Diff line number Diff line change 1+ ---
2+ gem : spree
3+ cve : 2011-10026
4+ ghsa : x485-rhg3-cqr4
5+ url : https://github.com/advisories/GHSA-x485-rhg3-cqr4
6+ title : Spree Commerce is vulnerable to RCE through Search API
7+ date : 2025-08-20
8+ description : |
9+ Spreecommerce versions prior to 0.50.x contain a remote command
10+ execution vulnerability in the API's search functionality. Improper
11+ input sanitation allows attackers to inject arbitrary shell commands
12+ via the search[instance_eval] parameter, which is dynamically invoked
13+ using Ruby’s send method. This flaw enables unauthenticated attackers
14+ to execute commands on the server.
15+ cvss_v3 : 9.8
16+ cvss_v4 : 9.3
17+ unaffected_versions :
18+ - " < 0.30.0.beta1"
19+ patched_versions :
20+ - " >= 0.50.0"
21+ related :
22+ url :
23+ - https://nvd.nist.gov/vuln/detail/CVE-2011-10026
24+ - https://github.com/spree
25+ - https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb
26+ - https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes
27+ - https://www.exploit-db.com/exploits/17199
28+ - https://www.vulncheck.com/advisories/spreecommerce-api-rce
29+ - https://github.com/spree/spree/commit/0a9a360c590829d8a377ceae0cf997bbbbcc2df4
30+ - https://github.com/spree/spree/commit/3b559e7219f3681184be409ad00cd34a34a37978
31+ - https://github.com/advisories/GHSA-x485-rhg3-cqr4
You can’t perform that action at this time.
0 commit comments