Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. spree
  4. ›
  5. CVE-2013-1656

CVE-2013-1656: Authenticated administrators to execute arbitrary commands

March 8, 2013 (updated May 18, 2016)

Spree Commerce allow remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.

References

  • cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1656

Code Behaviors & Features

Detect and mitigate CVE-2013-1656 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.0.0.rc1 up to 1.3.2

Fixed versions

  • 1.3.3
  • 2.0.0

Solution

Upgrade to versions 1.3.3, 2.0.0 or above.

Impact 4.3 MEDIUM

AV:N/AC:M/Au:N/C:N/I:P/A:N

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

gem/spree/CVE-2013-1656.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:37 +0000.