CVE-2021-43805
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/12/2021
Last modified:
08/12/2021
Description
Solidus is a free, open-source ecommerce platform built on Rails. Versions of Solidus prior to 3.1.4, 3.0.4, and 2.11.13 have a denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.` Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression. The maintainers added a check for email addresses that are no longer valid that will print information about any affected orders that exist. If a prompt upgrade is not an option, a workaround is available. It is possible to edit the file `config/application.rb` manually (with code provided by the maintainers in the GitHub Security Advisory) to check email validity.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:nebulab:solidus:*:*:*:*:*:*:*:* | 2.11.13 (excluding) | |
| cpe:2.3:a:nebulab:solidus:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.0.4 (excluding) |
| cpe:2.3:a:nebulab:solidus:*:*:*:*:*:*:*:* | 3.1.0 (including) | 3.1.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



