4.3
CVE-2013-1656
- EPSS 0.31%
- Veröffentlicht 08.03.2013 18:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Spreecommerce ≫ Spree Version <= 1.3.2
Spreecommerce ≫ Spree Version1.0.0
Spreecommerce ≫ Spree Version1.0.1
Spreecommerce ≫ Spree Version1.0.2
Spreecommerce ≫ Spree Version1.0.3
Spreecommerce ≫ Spree Version1.0.4
Spreecommerce ≫ Spree Version1.0.5
Spreecommerce ≫ Spree Version1.0.6
Spreecommerce ≫ Spree Version1.0.7
Spreecommerce ≫ Spree Version1.1.0
Spreecommerce ≫ Spree Version1.1.1
Spreecommerce ≫ Spree Version1.1.2
Spreecommerce ≫ Spree Version1.1.3
Spreecommerce ≫ Spree Version1.1.4
Spreecommerce ≫ Spree Version1.1.5
Spreecommerce ≫ Spree Version1.1.6
Spreecommerce ≫ Spree Version1.2.0
Spreecommerce ≫ Spree Version1.2.1
Spreecommerce ≫ Spree Version1.2.2
Spreecommerce ≫ Spree Version1.2.3
Spreecommerce ≫ Spree Version1.2.4
Spreecommerce ≫ Spree Version1.3.0
Spreecommerce ≫ Spree Version1.3.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.31% | 0.507 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.