Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 28 additions & 0 deletions gems/rd_searchlogic/CVE-2011-10026.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
---
gem: rd_searchlogic
cve: 2011-10026
ghsa: x485-rhg3-cqr4
url: https://github.com/advisories/GHSA-x485-rhg3-cqr4
title: Spree Commerce is vulnerable to RCE through Search API
date: 2025-08-20
description: |
Spreecommerce versions prior to 0.50.x contain a remote command
execution vulnerability in the API's search functionality. Improper
input sanitation allows attackers to inject arbitrary shell commands
via the search[instance_eval] parameter, which is dynamically invoked
using Ruby’s send method. This flaw enables unauthenticated attackers
to execute commands on the server.
cvss_v3: 9.8
cvss_v4: 9.3
notes: Never patched
related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2011-10026
- https://github.com/spree
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb
- https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes
- https://www.exploit-db.com/exploits/17199
- https://www.vulncheck.com/advisories/spreecommerce-api-rce
- https://github.com/spree/spree/commit/0a9a360c590829d8a377ceae0cf997bbbbcc2df4
- https://github.com/spree/spree/commit/3b559e7219f3681184be409ad00cd34a34a37978
- https://github.com/advisories/GHSA-x485-rhg3-cqr4
31 changes: 31 additions & 0 deletions gems/spree/CVE-2011-10026.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
---
gem: spree
cve: 2011-10026
ghsa: x485-rhg3-cqr4
url: https://github.com/advisories/GHSA-x485-rhg3-cqr4
title: Spree Commerce is vulnerable to RCE through Search API
date: 2025-08-20
description: |
Spreecommerce versions prior to 0.50.x contain a remote command
execution vulnerability in the API's search functionality. Improper
input sanitation allows attackers to inject arbitrary shell commands
via the search[instance_eval] parameter, which is dynamically invoked
using Ruby’s send method. This flaw enables unauthenticated attackers
to execute commands on the server.
cvss_v3: 9.8
cvss_v4: 9.3
unaffected_versions:
- "< 0.30.0.beta1"
patched_versions:
- ">= 0.50.0"
related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2011-10026
- https://github.com/spree
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb
- https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes
- https://www.exploit-db.com/exploits/17199
- https://www.vulncheck.com/advisories/spreecommerce-api-rce
- https://github.com/spree/spree/commit/0a9a360c590829d8a377ceae0cf997bbbbcc2df4
- https://github.com/spree/spree/commit/3b559e7219f3681184be409ad00cd34a34a37978
- https://github.com/advisories/GHSA-x485-rhg3-cqr4