Arbitrary Command Execution Affecting spree package, versions < 2.0.0


0.0
medium
  • Attack Complexity

    Low

  • User Interaction

    Required

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-RUBY-SPREE-20075

  • published

    20 Feb 2013

  • disclosed

    20 Feb 2013

  • credit

    Laurens Nienhaus

Overview

Spree is an open source e-commerce framework for Ruby on Rails.

Spree contains a flaw that is triggered when handling input passed via the promotion_action parameter to promotion_actions_controller.rb. This may allow a remote authenticated attacker to instantiate arbitrary Ruby objects and potentially execute arbitrary commands.