ID CVE-2008-7311
Type cve
Reporter cve@mitre.org
Modified 2012-04-12T04:00:00
Description
The session cookie store implementation in Spree 0.2.0 uses a hardcoded config.action_controller_session hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the config/environment.rb file.
{"id": "CVE-2008-7311", "bulletinFamily": "NVD", "title": "CVE-2008-7311", "description": "The session cookie store implementation in Spree 0.2.0 uses a hardcoded config.action_controller_session hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the config/environment.rb file.", "published": "2012-04-05T13:25:00", "modified": "2012-04-12T04:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-7311", "reporter": "cve@mitre.org", "references": ["http://spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-store/", "http://support.spreehq.org/issues/show/63"], "cvelist": ["CVE-2008-7311"], "type": "cve", "lastseen": "2019-05-29T18:09:30", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "3af6a310aa5cc316e5abfe3856d3befd"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "a4618aaa3c85915387cbe311e060c026"}, {"key": "cpe23", "hash": "f6ebf9ea4daed95ed57364390c492580"}, {"key": "cvelist", "hash": "f635f86b0b2b68519fc186fe4e820188"}, {"key": "cvss", "hash": "b5bbdd851ff7634dd01c09e00d03be1e"}, {"key": "cvss2", "hash": "e2b44d17a049a159a684c7e2b843b3fa"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "cc03f0f13c5b7a13cd38f730cca5a70f"}, {"key": "description", "hash": "c9d6a8245cf3d19e2a954334ef968cda"}, {"key": "href", "hash": "71b249e2a7955af52e6d3d2824b94a54"}, {"key": "modified", "hash": "157d75a6a2407b1878c17e54cc165333"}, {"key": "published", "hash": "894693a6a0c9eaa7b30bf2904c051688"}, {"key": "references", "hash": "880055aac00d15ebb1af36ae7e82e086"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "558d010ffb2299bb4a63b36894071db2"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "e0c6f9aead6aeef5f79e94c948f4263ee240f3fe6a44e0a2c1462a56b94bd347", "viewCount": 0, "enchantments": {"score": {"value": 4.4, "vector": "NONE", "modified": "2019-05-29T18:09:30"}, "dependencies": {"references": [], "modified": "2019-05-29T18:09:30"}, "vulnersScore": 4.4}, "objectVersion": "1.3", "cpe": ["cpe:/a:spreecommerce:spree:0.2.0"], "affectedSoftware": [{"name": "spreecommerce spree", "operator": "eq", "version": "0.2.0"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:spreecommerce:spree:0.2.0:*:*:*:*:*:*:*"], "cwe": ["CWE-255"]}
{}