Description
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.
Published: 2013-03-08
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2017-0268 Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.
Github GHSA Github GHSA GHSA-jxx8-v83v-rhw3 Spree Improper Input Validation vulnerability
History

No history.

Subscriptions

Spreecommerce Spree
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T15:13:32.736Z

Reserved: 2013-02-11T00:00:00.000Z

Link: CVE-2013-1656

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2013-03-08T18:55:01.637

Modified: 2026-04-29T01:13:23.040

Link: CVE-2013-1656

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses