Improperly Controlled Model Modification Affecting spree package, versions < 0.3.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.15% (52nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improperly Controlled Model Modification vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-SPREE-20005
  • published21 Sept 2008
  • disclosed21 Sept 2008
  • creditEric Chapweske

Introduced: 21 Sep 2008

CVE-2008-7310  (opens in a new tab)
CWE-915  (opens in a new tab)

Overview

Spree is an open source e-commerce framework for Ruby on Rails.

Spree contains a hash restriction weakness that occurs when parsing a modified URL. This may allow an attacker to manipulate order state values. The Order model was not using attr_accessible to protect its attributes from a potential mass assignment exploit.

CVSS Scores

version 3.1