CVE-2011-10019: Spree has Remote Command Execution vulnerability in search functionality
(updated )
Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.
References
- github.com/advisories/GHSA-97vm-c39p-jr86
- github.com/orgs/spree
- github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2011-10019.yml
- github.com/spree/spree
- nvd.nist.gov/vuln/detail/CVE-2011-10019
- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_search_exec.rb
- web.archive.org/web/20111009192436/http://spreecommerce.com/blog/2011/10/05/remote-command-product-group
- www.exploit-db.com/exploits/17941
- www.vulncheck.com/advisories/spreecommerce-search-parameter-rce
Code Behaviors & Features
Detect and mitigate CVE-2011-10019 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →