CVE-2020-26223

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/11/2020
Last modified:
30/11/2020

Description

Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree from version 3.7 and before versions 3.7.13, 4.0.5, and 4.1.12, there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched in versions 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:* 3.7.0 (including) 3.7.13 (excluding)
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:* 4.0.0 (including) 4.0.5 (excluding)
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:* 4.1.0 (including) 4.1.12 (excluding)