CVE-2011-10026: Spree Commerce is vulnerable to RCE through Search API
(updated )
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API’s search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
References
- github.com/advisories/GHSA-x485-rhg3-cqr4
- github.com/rubysec/ruby-advisory-db/blob/master/gems/rd_searchlogic/CVE-2011-10026.yml
- github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2011-10026.yml
- github.com/spree
- github.com/spree/spree
- github.com/spree/spree/commit/0a9a360c590829d8a377ceae0cf997bbbbcc2df4
- github.com/spree/spree/commit/3b559e7219f3681184be409ad00cd34a34a37978
- nvd.nist.gov/vuln/detail/CVE-2011-10026
- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_searchlogic_exec.rb
- web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes
- www.exploit-db.com/exploits/17199
- www.vulncheck.com/advisories/spreecommerce-api-rce
Code Behaviors & Features
Detect and mitigate CVE-2011-10026 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →