4.3

CVE-2013-1656

Exploit
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SpreecommerceSpree Version <= 1.3.2
SpreecommerceSpree Version1.0.0
SpreecommerceSpree Version1.0.1
SpreecommerceSpree Version1.0.2
SpreecommerceSpree Version1.0.3
SpreecommerceSpree Version1.0.4
SpreecommerceSpree Version1.0.5
SpreecommerceSpree Version1.0.6
SpreecommerceSpree Version1.0.7
SpreecommerceSpree Version1.1.0
SpreecommerceSpree Version1.1.1
SpreecommerceSpree Version1.1.2
SpreecommerceSpree Version1.1.3
SpreecommerceSpree Version1.1.4
SpreecommerceSpree Version1.1.5
SpreecommerceSpree Version1.1.6
SpreecommerceSpree Version1.2.0
SpreecommerceSpree Version1.2.1
SpreecommerceSpree Version1.2.2
SpreecommerceSpree Version1.2.3
SpreecommerceSpree Version1.2.4
SpreecommerceSpree Version1.3.0
SpreecommerceSpree Version1.3.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.31% 0.507
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.