Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. spree
  4. ›
  5. CVE-2008-7310

CVE-2008-7310: Credentials Management Errors

April 5, 2012

Spree does not properly restrict the use of a hash to provide values for a model’s attributes, which allows remote attackers to set the Order state value and bypass the intended payment step via a modified URL, related to a “mass assignment” vulnerability.

References

  • railspikes.com/2008/9/22/is-your-rails-application-safe-from-mass-assignment
  • spreecommerce.com/blog/2008/09/16/security-vulnerability-mass-assignment-of-order-params/
  • nvd.nist.gov/vuln/detail/CVE-2008-7310

Code Behaviors & Features

Detect and mitigate CVE-2008-7310 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

Version 0.2.0

Fixed versions

  • 0.4.0

Solution

Upgrade to version 0.4.0 or above.

Impact 5 MEDIUM

AV:N/AC:L/Au:N/C:N/I:P/A:N

Learn more about CVSS

Source file

gem/spree/CVE-2008-7310.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:59 +0000.