Skip to content

Commit e7530e9

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 2 brand new advisories
1 parent 07ab110 commit e7530e9

File tree

2 files changed

+59
-0
lines changed

2 files changed

+59
-0
lines changed
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
gem: rd_searchlogic
3+
cve: 2011-10026
4+
ghsa: x485-rhg3-cqr4
5+
url: https://github.com/advisories/GHSA-x485-rhg3-cqr4
6+
title: Spree Commerce is vulnerable to RCE through Search API
7+
date: 2025-08-20
8+
description: |
9+
Spreecommerce versions prior to 0.50.x contain a remote command
10+
execution vulnerability in the API's search functionality. Improper
11+
input sanitation allows attackers to inject arbitrary shell commands
12+
via the search[instance_eval] parameter, which is dynamically invoked
13+
using Ruby’s send method. This flaw enables unauthenticated attackers
14+
to execute commands on the server.
15+
cvss_v3: 9.8
16+
cvss_v4: 9.3
17+
notes: Never patched
18+
related:
19+
url:
20+
- https://nvd.nist.gov/vuln/detail/CVE-2011-10026
21+
- https://github.com/spree
22+
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb
23+
- https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes
24+
- https://www.exploit-db.com/exploits/17199
25+
- https://www.vulncheck.com/advisories/spreecommerce-api-rce
26+
- https://github.com/spree/spree/commit/0a9a360c590829d8a377ceae0cf997bbbbcc2df4
27+
- https://github.com/spree/spree/commit/3b559e7219f3681184be409ad00cd34a34a37978
28+
- https://github.com/advisories/GHSA-x485-rhg3-cqr4

gems/spree/CVE-2011-10026.yml

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
gem: spree
3+
cve: 2011-10026
4+
ghsa: x485-rhg3-cqr4
5+
url: https://github.com/advisories/GHSA-x485-rhg3-cqr4
6+
title: Spree Commerce is vulnerable to RCE through Search API
7+
date: 2025-08-20
8+
description: |
9+
Spreecommerce versions prior to 0.50.x contain a remote command
10+
execution vulnerability in the API's search functionality. Improper
11+
input sanitation allows attackers to inject arbitrary shell commands
12+
via the search[instance_eval] parameter, which is dynamically invoked
13+
using Ruby’s send method. This flaw enables unauthenticated attackers
14+
to execute commands on the server.
15+
cvss_v3: 9.8
16+
cvss_v4: 9.3
17+
unaffected_versions:
18+
- "< 0.30.0.beta1"
19+
patched_versions:
20+
- ">= 0.50.0"
21+
related:
22+
url:
23+
- https://nvd.nist.gov/vuln/detail/CVE-2011-10026
24+
- https://github.com/spree
25+
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb
26+
- https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes
27+
- https://www.exploit-db.com/exploits/17199
28+
- https://www.vulncheck.com/advisories/spreecommerce-api-rce
29+
- https://github.com/spree/spree/commit/0a9a360c590829d8a377ceae0cf997bbbbcc2df4
30+
- https://github.com/spree/spree/commit/3b559e7219f3681184be409ad00cd34a34a37978
31+
- https://github.com/advisories/GHSA-x485-rhg3-cqr4

0 commit comments

Comments
 (0)