GHSA-3mvg-rrrw-m7ph

Suggest an improvement
Source
https://github.com/advisories/GHSA-3mvg-rrrw-m7ph
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/08/GHSA-3mvg-rrrw-m7ph/GHSA-3mvg-rrrw-m7ph.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-3mvg-rrrw-m7ph
Aliases
Published
2020-08-04T22:17:57Z
Modified
2023-11-08T04:02:29.490408Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Ability to change order address without triggering address validations in solidus
Details

Impact

This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipment costs associated with the new shipment.

All stores with at least two shipping zones and different costs of shipment per zone are impacted.

E.g. 1. Store admin configured the store so that there are two zones in US: - East Cost Zone - Shipping Method cost: $1 - West Cost Zone - Shipping Method cost: $10

The attacker user can know that shipping to NY is less expensive than to LA just by testing different addresses in checkout.

  1. The attacker user enters any NY shipping address in the address step
  2. The attacker user chooses the $1 delivery option
  3. The attacker user crafts a request with their real LA address, similar to:
    // POST #checkout/update:
    
    {
      state: 'payment',
      order: {
        ship_address_attributes: {
          city: 'Los Angeles',
          ...
        }
      }
    }
    
  4. The attacker user proceeds with checking out with a new address and the $1 shipment costs.

Another scenario where this could be dangerous is:

You cannot ship products in some zones and you are relying on Solidus Shipping Method building only to filter out unwanted zones. Malicious users can enter an allowed zone's address and change back to an unwanted one in the payment step by crafting a request with some proper shipaddressattributes.

This problem comes from how checkout permitted attributes are structured. We have a single list of attributes that are permitted across the whole checkout, no matter the step that is being submitted.

Patches

A PR has been attached to fix the security concern for each of all the Solidus supported versions following the rules of the Solidus Security Policy.

Workarounds

When it's not possible to upgrade to a supported patched version, please use this gist to patch the store:

https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d

Database specific
{
    "nvd_published_at": "2020-08-04T23:15:00Z",
    "github_reviewed_at": "2020-08-04T20:54:07Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-20",
        "CWE-862"
    ]
}
References

Affected packages

RubyGems / solidus_frontend

Package

Name
solidus_frontend
Purl
pkg:gem/solidus_frontend

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.8.6

Affected versions

1.*

1.0.0.pre
1.0.0.pre2
1.0.0.pre3
1.0.0.rc1
1.0.0.rc2
1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.1.0.beta1
1.1.0.pre1
1.1.0.pre2
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.2.0.beta1
1.2.0.rc1
1.2.0.rc2
1.2.0
1.2.1
1.2.2
1.2.3
1.3.0.beta1
1.3.0.rc1
1.3.0.rc2
1.3.0
1.3.1
1.3.2
1.4.0.beta1
1.4.0.rc1
1.4.0
1.4.1
1.4.2

2.*

2.0.0.beta1
2.0.0.rc1
2.0.0
2.0.1
2.0.2
2.0.3
2.1.0.beta1
2.1.0.rc1
2.1.0
2.1.1
2.2.0.beta1
2.2.0.rc1
2.2.0
2.2.1
2.2.2
2.3.0.beta1
2.3.0.rc1
2.3.0.rc2
2.3.0.rc3
2.3.0
2.3.1
2.4.0.beta1
2.4.0.rc1
2.4.0
2.4.1
2.4.2
2.5.0.beta1
2.5.0.beta2
2.5.0.rc1
2.5.0
2.5.1
2.5.2
2.6.0.rc1
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.6.6
2.7.0
2.7.1
2.7.2
2.7.3
2.7.4
2.8.0
2.8.1
2.8.2
2.8.3
2.8.4
2.8.5

RubyGems / solidus_frontend

Package

Name
solidus_frontend
Purl
pkg:gem/solidus_frontend

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.9.0
Fixed
2.9.6

Affected versions

2.*

2.9.0
2.9.1
2.9.2
2.9.3
2.9.4
2.9.5

RubyGems / solidus_frontend

Package

Name
solidus_frontend
Purl
pkg:gem/solidus_frontend

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.10.0
Fixed
2.10.2

Affected versions

2.*

2.10.0
2.10.1

RubyGems / solidus_api

Package

Name
solidus_api
Purl
pkg:gem/solidus_api

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.8.6

Affected versions

1.*

1.0.0.pre
1.0.0.pre2
1.0.0.pre3
1.0.0.rc1
1.0.0.rc2
1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.1.0.beta1
1.1.0.pre1
1.1.0.pre2
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.2.0.beta1
1.2.0.rc1
1.2.0.rc2
1.2.0
1.2.1
1.2.2
1.2.3
1.3.0.beta1
1.3.0.rc1
1.3.0.rc2
1.3.0
1.3.1
1.3.2
1.4.0.beta1
1.4.0.rc1
1.4.0
1.4.1
1.4.2

2.*

2.0.0.beta1
2.0.0.rc1
2.0.0
2.0.1
2.0.2
2.0.3
2.1.0.beta1
2.1.0.rc1
2.1.0
2.1.1
2.2.0.beta1
2.2.0.rc1
2.2.0
2.2.1
2.2.2
2.3.0.beta1
2.3.0.rc1
2.3.0.rc2
2.3.0.rc3
2.3.0
2.3.1
2.4.0.beta1
2.4.0.rc1
2.4.0
2.4.1
2.4.2
2.5.0.beta1
2.5.0.beta2
2.5.0.rc1
2.5.0
2.5.1
2.5.2
2.6.0.rc1
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.6.6
2.7.0
2.7.1
2.7.2
2.7.3
2.7.4
2.8.0
2.8.1
2.8.2
2.8.3
2.8.4
2.8.5

RubyGems / solidus_api

Package

Name
solidus_api
Purl
pkg:gem/solidus_api

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.9.0
Fixed
2.9.6

Affected versions

2.*

2.9.0
2.9.1
2.9.2
2.9.3
2.9.4
2.9.5

RubyGems / solidus_api

Package

Name
solidus_api
Purl
pkg:gem/solidus_api

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.10.0
Fixed
2.10.2

Affected versions

2.*

2.10.0
2.10.1