The session cookie store implementation in Spree 0.2.0 uses a hardcoded config.action_controller_session
hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the config/environment.rb
file.
spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-store
github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2008-7311.yml
github.com/spree/spree
nvd.nist.gov/vuln/detail/CVE-2008-7311
spreecommerce.com/blog/security-vulernability-session-cookie-store
web.archive.org/web/20090306033106/support.spreehq.org/issues/show/63
web.archive.org/web/20100309050152/rubygems.org/gems/spree/versions
web.archive.org/web/20101128024939/spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-store