Vulnerability Description
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Spreecommerce | Spree | < 0.50.1 |
Related Weaknesses (CWE)
References
- https://github.com/spreeProduct
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/expExploitThird Party Advisory
- https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04Vendor Advisory
- https://www.exploit-db.com/exploits/17199ExploitVDB Entry
- https://www.vulncheck.com/advisories/spreecommerce-api-rceThird Party Advisory
FAQ
What is CVE-2011-10026?
CVE-2011-10026 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands...
How severe is CVE-2011-10026?
CVE-2011-10026 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2011-10026?
Check the references section above for vendor advisories and patch information. Affected products include: Spreecommerce Spree.