Skip to content

Commit 4ee854b

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@4bb67e0
1 parent 8bb632a commit 4ee854b

File tree

2 files changed

+74
-0
lines changed

2 files changed

+74
-0
lines changed
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2011-10019 (spree): Remote Command Execution in Spree search functionality'
4+
comments: false
5+
categories:
6+
- spree
7+
advisory:
8+
gem: spree
9+
cve: 2011-10019
10+
ghsa: 97vm-c39p-jr86
11+
url: https://github.com/advisories/GHSA-97vm-c39p-jr86
12+
title: Remote Command Execution in Spree search functionality
13+
date: 2011-02-10
14+
description: |
15+
Spree versions prior to 0.60.2 contain a remote command execution
16+
vulnerability in the search functionality. The application fails to
17+
properly sanitize input passed via the `search[:send][]` parameter,
18+
which is dynamically invoked using Ruby’s `send` method. This allows
19+
attackers to execute arbitrary shell commands on the server without
20+
authentication.
21+
cvss_v2: 9.0
22+
patched_versions:
23+
- ">= 0.60.2"
24+
related:
25+
url:
26+
- https://nvd.nist.gov/vuln/detail/CVE-2011-10019
27+
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_search_exec.rb
28+
- https://web.archive.org/web/20111009192436/http://spreecommerce.com/blog/2011/10/05/remote-command-product-group
29+
- https://www.exploit-db.com/exploits/17941
30+
- https://www.vulncheck.com/advisories/spreecommerce-search-parameter-rce
31+
- https://github.com/orgs/spree/spree
32+
- https://github.com/advisories/GHSA-97vm-c39p-jr86
33+
---
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-45765 (ruby-jwt): ruby-jwt < v3.0.0.beta1 was discovered to contain
4+
weak encryption'
5+
comments: false
6+
categories:
7+
- ruby-jwt
8+
advisory:
9+
gem: ruby-jwt
10+
cve: 2025-45765
11+
ghsa: 6ch4-944p-wf7j
12+
url: https://github.com/advisories/GHSA-6ch4-944p-wf7j
13+
title: ruby-jwt < v3.0.0.beta1 was discovered to contain weak encryption
14+
date: 2025-08-07
15+
description: |
16+
ruby-jwt < v3.0.0.beta1 was discovered to contain weak encryption.
17+
18+
NOTE: the Supplier's perspective is "keysize is not something
19+
that is enforced by this library. Currently more recent versions
20+
of OpenSSL are enforcing some key sizes and those restrictions
21+
apply to the users of this gem also."
22+
23+
## BACKGROUND
24+
25+
We found that the HMAC and RSA key lengths used in your JSON Web
26+
Signature (JWS) implementation do not meet recommended security
27+
standards (RFC 75180NIST SP800-1170RFC 2437).
28+
29+
According to CWE-326 (Inadequate Encryption Strength), using keys
30+
that are too short can lead to serious vulnerabilities and
31+
potential attacks.
32+
cvss_v3: 9.1
33+
patched_versions:
34+
- ">= 3.0.0.beta1"
35+
related:
36+
url:
37+
- https://nvd.nist.gov/vuln/detail/CVE-2025-45765
38+
- https://github.com/advisories/GHSA-6ch4-944p-wf7j
39+
- https://github.com/jwt/ruby-jwt/issues/668
40+
- https://gist.github.com/ZupeiNie/c621253068ce5b64911629534879e8f9
41+
---

0 commit comments

Comments
 (0)