Cross Site Request Forgery Affecting spree package, versions < 3.0.0.rc4, >= 2.5< 2.4.5, >= 2.4< 2.3.8, >= 2.3< 2.2.10


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross Site Request Forgery vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-SPREE-20360
  • published4 Mar 2015
  • disclosed4 Mar 2015
  • creditEgor Homakov

Introduced: 4 Mar 2015

CVE NOT AVAILABLE CWE-200  (opens in a new tab)

Overview

Spree is an open source e-commerce framework for Ruby on Rails.

Spree contains a flaw in the API as HTTP requests do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a Cross-site Request Forgery (CSRF / XSRF) attack causing the victim to disclose potentially sensitive information to attackers.

CVSS Base Scores

version 3.1