GHSA-97vm-c39p-jr86
Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://nvd.nist.gov/vuln/detail/CVE-2011-10019, https://github.com/orgs/spree, https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2011-10019.yml, https://github.com/spree/spree, https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spreesearchexec.rb, https://web.archive.org/web/20111009192436/http://spreecommerce.com/blog/2011/10/05/remote-command-product-group, https://www.exploit-db.com/exploits/17941, https://www.vulncheck.com/advisories/spreecommerce-search-parameter-rce
