CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
EPSS
Percentile
51.5%
The session cookie store implementation in Spree 0.2.0 uses a hardcoded config.action_controller_session
hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the config/environment.rb
file.
spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-store/
github.com/advisories/GHSA-g466-57gh-cqfw
github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2008-7311.yml
nvd.nist.gov/vuln/detail/CVE-2008-7311
spreecommerce.com/blog/security-vulernability-session-cookie-store
web.archive.org/web/20090306033106/support.spreehq.org/issues/show/63
web.archive.org/web/20100309050152/rubygems.org/gems/spree/versions
web.archive.org/web/20101128024939/spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-store/