Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. solidus_core
  4. ›
  5. GMS-2021-4

GMS-2021-4: Authentication Bypass by CSRF Weakness

November 18, 2021 (updated March 2, 2022)

Impact

The actual vulnerability has been discovered on solidus_auth_devise. See GHSA-xm34-v85h-9pg2 for details.

The security advisory here exists to provide an extra layer of security in the form of a monkey patch for users who don’t update solidus_auth_devise. For this reason, it has been marked as low impact on this end.

Patches

For extra security, update solidus_core to versions 3.1.3, 3.0.3 or 2.11.12.

Workarounds

Look at the workarounds described at GHSA-xm34-v85h-9pg2.

References

  • GHSA-xm34-v85h-9pg2.

For more information

If you have any questions or comments about this advisory:

  • Open an issue in solidus_auth_devise or a discussion in solidus
  • Email us at security@solidus.io
  • Contact the core team on Slack

References

  • github.com/advisories/GHSA-5629-8855-gf4g
  • github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g
  • github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2

Code Behaviors & Features

Detect and mitigate GMS-2021-4 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.11.12, all versions starting from 3.0.0 before 3.0.3, all versions starting from 3.1.0 before 3.1.3

Fixed versions

  • 2.11.12
  • 3.0.3
  • 3.1.3

Solution

Upgrade to versions 2.11.12, 3.0.3, 3.1.3 or above.

Source file

gem/solidus_core/GMS-2021-4.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:50 +0000.