CVE-2021-41274

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-41274
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-41274.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-41274
Aliases
Published
2021-11-17T20:15:10Z
Modified
2024-05-30T03:15:26.129631Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

solidusauthdevise provides authentication services for the Solidus webstore framework, using the Devise gem. In affected versions solidusauthdevise is subject to a CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of solidus_auth_devise are affected if protect_from_forgery method is both: Executed whether as: A before_action callback (the default) or A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). Users should promptly update to solidus_auth_devise version 2.5.4. Users unable to update should if possible, change their strategy to :exception. Please see the linked GHSA for more workaround details.

References

Affected packages

Git / github.com/solidusio/solidus_auth_devise

Affected ranges

Type
GIT
Repo
https://github.com/solidusio/solidus_auth_devise
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.1.0
v1.2.0
v1.2.2
v1.2.3
v1.3.0
v1.4.0
v1.5.0
v1.6.0
v1.6.1
v1.6.2
v1.6.3
v1.6.4

v2.*

v2.0.0
v2.1.0
v2.2.0
v2.3.0
v2.4.0
v2.5.0
v2.5.1
v2.5.2
v2.5.3