Lucene search

K
githubGitHub Advisory DatabaseGHSA-G466-57GH-CQFW
HistoryMay 17, 2022 - 5:30 a.m.

Spree uses a hardcoded hash value

2022-05-1705:30:58
GitHub Advisory Database
github.com
8
spree
session cookie
hardcoded hash

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

51.5%

The session cookie store implementation in Spree 0.2.0 uses a hardcoded config.action_controller_session hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the config/environment.rb file.

Affected configurations

Vulners
Node
spreespreeRange<0.4.0
VendorProductVersionCPE
spreespree*cpe:2.3:a:spree:spree:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

51.5%

Related for GHSA-G466-57GH-CQFW