Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. spree
  4. ›
  5. CVE-2008-7311

CVE-2008-7311: Credentials Management Errors

April 5, 2012 (updated April 12, 2012)

The session cookie store implementation in Spree uses a hardcoded config.action_controller_session hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the config/environment.rb file.

References

  • spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-store/
  • support.spreehq.org/issues/show/63
  • nvd.nist.gov/vuln/detail/CVE-2008-7311

Code Behaviors & Features

Detect and mitigate CVE-2008-7311 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

Version 0.2.0

Fixed versions

  • 0.4.0

Solution

Upgrade to version 0.4.0 or above.

Impact 5 MEDIUM

AV:N/AC:L/Au:N/C:N/I:P/A:N

Learn more about CVSS

Source file

gem/spree/CVE-2008-7311.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:43 +0000.