File tree Expand file tree Collapse file tree 2 files changed +74
-0
lines changed
Expand file tree Collapse file tree 2 files changed +74
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' CVE-2011-10019 (spree): Remote Command Execution in Spree search functionality'
4+ comments : false
5+ categories :
6+ - spree
7+ advisory :
8+ gem : spree
9+ cve : 2011-10019
10+ ghsa : 97vm-c39p-jr86
11+ url : https://github.com/advisories/GHSA-97vm-c39p-jr86
12+ title : Remote Command Execution in Spree search functionality
13+ date : 2011-02-10
14+ description : |
15+ Spree versions prior to 0.60.2 contain a remote command execution
16+ vulnerability in the search functionality. The application fails to
17+ properly sanitize input passed via the `search[:send][]` parameter,
18+ which is dynamically invoked using Ruby’s `send` method. This allows
19+ attackers to execute arbitrary shell commands on the server without
20+ authentication.
21+ cvss_v2 : 9.0
22+ patched_versions :
23+ - " >= 0.60.2"
24+ related :
25+ url :
26+ - https://nvd.nist.gov/vuln/detail/CVE-2011-10019
27+ - https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_search_exec.rb
28+ - https://web.archive.org/web/20111009192436/http://spreecommerce.com/blog/2011/10/05/remote-command-product-group
29+ - https://www.exploit-db.com/exploits/17941
30+ - https://www.vulncheck.com/advisories/spreecommerce-search-parameter-rce
31+ - https://github.com/orgs/spree/spree
32+ - https://github.com/advisories/GHSA-97vm-c39p-jr86
33+ ---
Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' CVE-2025-45765 (ruby-jwt): ruby-jwt < v3.0.0.beta1 was discovered to contain
4+ weak encryption'
5+ comments : false
6+ categories :
7+ - ruby-jwt
8+ advisory :
9+ gem : ruby-jwt
10+ cve : 2025-45765
11+ ghsa : 6ch4-944p-wf7j
12+ url : https://github.com/advisories/GHSA-6ch4-944p-wf7j
13+ title : ruby-jwt < v3.0.0.beta1 was discovered to contain weak encryption
14+ date : 2025-08-07
15+ description : |
16+ ruby-jwt < v3.0.0.beta1 was discovered to contain weak encryption.
17+
18+ NOTE: the Supplier's perspective is "keysize is not something
19+ that is enforced by this library. Currently more recent versions
20+ of OpenSSL are enforcing some key sizes and those restrictions
21+ apply to the users of this gem also."
22+
23+ ## BACKGROUND
24+
25+ We found that the HMAC and RSA key lengths used in your JSON Web
26+ Signature (JWS) implementation do not meet recommended security
27+ standards (RFC 75180NIST SP800-1170RFC 2437).
28+
29+ According to CWE-326 (Inadequate Encryption Strength), using keys
30+ that are too short can lead to serious vulnerabilities and
31+ potential attacks.
32+ cvss_v3 : 9.1
33+ patched_versions :
34+ - " >= 3.0.0.beta1"
35+ related :
36+ url :
37+ - https://nvd.nist.gov/vuln/detail/CVE-2025-45765
38+ - https://github.com/advisories/GHSA-6ch4-944p-wf7j
39+ - https://github.com/jwt/ruby-jwt/issues/668
40+ - https://gist.github.com/ZupeiNie/c621253068ce5b64911629534879e8f9
41+ ---
You can’t perform that action at this time.
0 commit comments