Vulnerability Description
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Spreecommerce | Spree | <= 1.3.2 |
Related Weaknesses (CWE)
References
- http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html
- http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixedVendor Advisory
- https://www.conviso.com.br/advisories/CVE-2013-1656.txtExploit
- http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html
- http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixedVendor Advisory
- https://www.conviso.com.br/advisories/CVE-2013-1656.txtExploit
FAQ
What is CVE-2013-1656?
CVE-2013-1656 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/cont...
How severe is CVE-2013-1656?
CVE-2013-1656 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1656?
Check the references section above for vendor advisories and patch information. Affected products include: Spreecommerce Spree.