CVE-2011-10026
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dynamically invoked using Ruby’s send method. This flaw enables unauthenticated attackers to execute commands on the server.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://nvd.nist.gov/vuln/detail/CVE-2011-10026, https://github.com/spree/spree/commit/0a9a360c590829d8a377ceae0cf997bbbbcc2df4, https://github.com/spree/spree/commit/3b559e7219f3681184be409ad00cd34a34a37978, https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdsearchlogic/CVE-2011-10026.yml, https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2011-10026.yml, https://github.com/spree, https://github.com/spree/spree, https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spreesearchlogic_exec.rb, https://web.archive.org/web/20111120023342/http://spreecommerce.com/blog/2011/04/19/security-fixes, https://www.exploit-db.com/exploits/17199, https://www.vulncheck.com/advisories/spreecommerce-api-rce
