Skip to content

Commit 386b1cf

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: Update old advisory to match GHSA DB
1 parent 707fa6c commit 386b1cf

File tree

1 file changed

+9
-4
lines changed

1 file changed

+9
-4
lines changed

gems/spree/CVE-2013-1656.yml

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
gem: spree
33
cve: 2013-1656
44
ghsa: jxx8-v83v-rhw3
5-
url: https://blog.convisoappsec.com/en/spree-commerce-multiple-unsafe-reflection-vulnerabilities-cve-2013-1656
5+
url: https://github.com/advisories/GHSA-jxx8-v83v-rhw3
66
title: Spree controller Parameter Arbitrary Ruby Object Instantiation Command Execution
77
date: 2013-02-21
88
description: |
9-
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated
9+
Spree Commerce 1.0.x before 2.0.0.rc1 allows remote authenticated
1010
administrators to instantiate arbitrary Ruby objects and executd
1111
arbitrary commands via the
1212
(1) payment_method parameter to core/app/controllers/spree/admin/
@@ -18,7 +18,12 @@ description: |
1818
of the constantize function.
1919
cvss_v2: 4.3
2020
patched_versions:
21-
- ">= 2.0.0"
21+
- ">= 2.0.0.rc1"
2222
related:
2323
url:
24-
- https://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
24+
- https://nvd.nist.gov/vuln/detail/CVE-2013-1656
25+
- https://github.com/spree/spree/commit/70092eb55b8be8fe5d21a7658b62da658612fba7
26+
- https://web.archive.org/web/20130907044454/https://www.conviso.com.br/advisories/CVE-2013-1656.txt
27+
- https://web.archive.org/web/20140329142330/http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
28+
- https://web.archive.org/web/20140618100330/http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html
29+
- https://github.com/advisories/GHSA-jxx8-v83v-rhw3

0 commit comments

Comments
 (0)