Solidus is a free, open-source ecommerce platform built on Rails. Versions of Solidus prior to 3.1.4, 3.0.4, and 2.11.13 have a denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.` Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression. The maintainers added a check for email addresses that are no longer valid that will print information about any affected orders that exist. If a prompt upgrade is not an option, a workaround is available. It is possible to edit the file `config/application.rb` manually (with code provided by the maintainers in the GitHub Security Advisory) to check email validity.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T04:03:08.816Z

Reserved: 2021-11-16T00:00:00

Link: CVE-2021-43805

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-07T18:15:07.407

Modified: 2024-11-21T06:29:49.757

Link: CVE-2021-43805

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.