GHSA-hwrx-wc75-mgh7

Suggest an improvement
Source
https://github.com/advisories/GHSA-hwrx-wc75-mgh7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-hwrx-wc75-mgh7/GHSA-hwrx-wc75-mgh7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-hwrx-wc75-mgh7
Aliases
  • CVE-2010-3978
Published
2022-05-14T02:42:49Z
Modified
2024-12-05T05:48:51.807942Z
Summary
Spree allows remote attackers to obtain sensitive information
Details

Spree 0.11.x before 0.11.2 and 0.30.x before 0.30.0 exchanges data using JavaScript Object Notation (JSON) without a mechanism for validating requests, which allows remote attackers to obtain sensitive information via vectors involving (1) admin/products.json, (2) admin/users.json, or (3) admin/overview/get_report_data, related to a "JSON hijacking" issue.

Database specific
{
    "nvd_published_at": "2010-11-17T16:00:00Z",
    "cwe_ids": [
        "CWE-200"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-01-27T00:18:49Z"
}
References

Affected packages

RubyGems / spree

Package

Name
spree
Purl
pkg:gem/spree

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.11.0
Fixed
0.11.2

Affected versions

0.*

0.11.0
0.11.1

RubyGems / spree

Package

Name
spree
Purl
pkg:gem/spree

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.30.0.beta1
Fixed
0.30.0

Affected versions

0.*

0.30.0.beta1