gsd-2020-26223
Vulnerability from gsd
Modified
2020-11-13 00:00
Details
### Impact
The perpetrator could query the [API v2 Order Status]
(https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status) endpoint
with an empty string passed as an Order token
### Patches
Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version.
Users of Spree < 3.7 are not affected.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-26223", "description": "Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree from version 3.7 and before versions 3.7.13, 4.0.5, and 4.1.12, there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched in versions 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree \u003c 3.7 are not affected.", "id": "GSD-2020-26223" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "affected": [ { "package": { "ecosystem": "RubyGems", "name": "spree_api", "purl": "pkg:gem/spree_api" } } ], "aliases": [ "CVE-2020-26223", "GHSA-m2jr-hmc3-qmpr" ], "details": "### Impact\nThe perpetrator could query the [API v2 Order Status]\n(https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status) endpoint\nwith an empty string passed as an Order token\n\n### Patches\nPlease upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version.\nUsers of Spree \u003c 3.7 are not affected.", "id": "GSD-2020-26223", "modified": "2020-11-13T00:00:00.000Z", "published": "2020-11-13T00:00:00.000Z", "references": [ { "type": "WEB", "url": "https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr" }, { "type": "WEB", "url": "https://github.com/spree/spree/pull/10573" } ], "schema_version": "1.4.0", "severity": [ { "score": 7.7, "type": "CVSS_V3" } ], "summary": "Authorization bypass in Spree" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26223", "STATE": "PUBLIC", "TITLE": "Authorization bypass in Spree" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "spree", "version": { "version_data": [ { "version_value": "\u003e= 3.7.0, \u003c 3.7.13" }, { "version_value": "\u003e= 4.0.0, \u003c 4.0.5" }, { "version_value": "\u003e= 4.1.0, \u003c 4.1.12" } ] } } ] }, "vendor_name": "spree" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree from version 3.7 and before versions 3.7.13, 4.0.5, and 4.1.12, there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched in versions 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree \u003c 3.7 are not affected." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-863: Incorrect Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr", "refsource": "CONFIRM", "url": "https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr" }, { "name": "https://github.com/spree/spree/pull/10573", "refsource": "MISC", "url": "https://github.com/spree/spree/pull/10573" }, { "name": "https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status", "refsource": "MISC", "url": "https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status" } ] }, "source": { "advisory": "GHSA-m2jr-hmc3-qmpr", "discovery": "UNKNOWN" } }, "github.com/rubysec/ruby-advisory-db": { "cve": "2020-26223", "cvss_v3": 7.7, "date": "2020-11-13", "description": "### Impact\nThe perpetrator could query the [API v2 Order Status]\n(https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status) endpoint\nwith an empty string passed as an Order token\n\n### Patches\nPlease upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version.\nUsers of Spree \u003c 3.7 are not affected.", "gem": "spree_api", "ghsa": "m2jr-hmc3-qmpr", "patched_versions": [ "~\u003e 3.7.11", "~\u003e 4.0.4", "\u003e= 4.1.11" ], "related": { "url": [ "https://github.com/spree/spree/pull/10573" ] }, "title": "Authorization bypass in Spree", "unaffected_versions": [ "\u003c 3.7.0" ], "url": "https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr" }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=3.7.0 \u003c3.7.13||\u003e=4.0.0 \u003c4.0.5||\u003e=4.1.0 \u003c4.1.12", "affected_versions": "All versions starting from 3.7.0 before 3.7.13, all versions starting from 4.0.0 before 4.0.5, all versions starting from 4.1.0 before 4.1.12", "cvss_v2": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-863", "CWE-937" ], "date": "2020-11-30", "description": "Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched depending on your used Spree version. Users of Spree are not affected.", "fixed_versions": [ "3.7.13", "4.0.5", "4.1.12" ], "identifier": "CVE-2020-26223", "identifiers": [ "CVE-2020-26223", "GHSA-m2jr-hmc3-qmpr" ], "not_impacted": "All versions before 3.7.0, all versions starting from 3.7.13 before 4.0.0, all versions starting from 4.0.5 before 4.1.0, all versions starting from 4.1.12", "package_slug": "gem/spree", "pubdate": "2020-11-13", "solution": "Upgrade to versions 3.7.13, 4.0.5, 4.1.12 or above.", "title": "Incorrect Authorization", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-26223", "https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status" ], "uuid": "e6d84157-96bc-45c4-98aa-e46a1d9f47b3" }, { "affected_range": "\u003e=3.7.0 \u003c3.7.13||\u003e=4.0.0 \u003c4.0.5||\u003e=4.1.0 \u003c4.1.12", "affected_versions": "All versions starting from 3.7.0 before 3.7.13, all versions starting from 4.0.0 before 4.0.5, all versions starting from 4.1.0 before 4.1.12", "cvss_v2": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-863", "CWE-937" ], "date": "2020-11-30", "description": "Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched depending on your used Spree version. Users of Spree are not affected.", "fixed_versions": [ "3.7.13", "4.0.5", "4.1.12" ], "identifier": "CVE-2020-26223", "identifiers": [ "CVE-2020-26223", "GHSA-m2jr-hmc3-qmpr" ], "not_impacted": "All versions before 3.7.0, all versions starting from 3.7.13 before 4.0.0, all versions starting from 4.0.5 before 4.1.0, all versions starting from 4.1.12", "package_slug": "gem/spree_api", "pubdate": "2020-11-13", "solution": "Upgrade to versions 3.7.13, 4.0.5, 4.1.12 or above.", "title": "Incorrect Authorization", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-26223", "https://github.com/spree/spree/pull/10573", "https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr", "https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status" ], "uuid": "1c455e37-abb5-4e95-8f83-a91399173e46" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.7.13", "versionStartIncluding": "3.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.0.5", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.12", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26223" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree from version 3.7 and before versions 3.7.13, 4.0.5, and 4.1.12, there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched in versions 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree \u003c 3.7 are not affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-863" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/spree/spree/pull/10573", "refsource": "MISC", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/spree/spree/pull/10573" }, { "name": "https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr" }, { "name": "https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2020-11-30T16:18Z", "publishedDate": "2020-11-13T18:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…