Description
Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.
Problem types
CWE-94 Improper Control of Generation of Code ('Code Injection')
CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Product status
* before 0.60.2
Credits
joernchen
References
raw.githubusercontent.com/...multi/http/spree_search_exec.rb
www.exploit-db.com/exploits/17941
web.archive.org/.../2011/10/05/remote-command-product-group/
www.vulncheck.com/...ries/spreecommerce-search-parameter-rce
github.com/orgs/spree