Description
Spree 0.11.x before 0.11.2 and 0.30.x before 0.30.0 exchanges data using JavaScript Object Notation (JSON) without a mechanism for validating requests, which allows remote attackers to obtain sensitive information via vectors involving (1) admin/products.json, (2) admin/users.json, or (3) admin/overview/get_report_data, related to a "JSON hijacking" issue.
Published: 2010-11-17
Score: 5.0 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-4232 Spree 0.11.x before 0.11.2 and 0.30.x before 0.30.0 exchanges data using JavaScript Object Notation (JSON) without a mechanism for validating requests, which allows remote attackers to obtain sensitive information via vectors involving (1) admin/products.json, (2) admin/users.json, or (3) admin/overview/get_report_data, related to a "JSON hijacking" issue.
Github GHSA Github GHSA GHSA-hwrx-wc75-mgh7 Spree allows remote attackers to obtain sensitive information
History

No history.

Subscriptions

Spreecommerce Spree
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T03:26:12.329Z

Reserved: 2010-10-18T00:00:00.000Z

Link: CVE-2010-3978

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-11-17T16:00:02.343

Modified: 2026-04-29T01:13:23.040

Link: CVE-2010-3978

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses