CVE-2020-15269

In Spree before versions 3.7.11, 4.0.4, or 4.1.11, expired user tokens could be used to access Storefront API v2 endpoints. The issue is patched in versions 3.7.11, 4.0.4 and 4.1.11. A workaround without upgrading is described in the linked advisory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sparksolutions:spree:*:*:*:*:*:*:*:*
cpe:2.3:a:sparksolutions:spree:*:*:*:*:*:*:*:*
cpe:2.3:a:sparksolutions:spree:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:05

Type Values Removed Values Added
References () https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847 - Patch, Third Party Advisory () https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847 - Patch, Third Party Advisory
References () https://github.com/spree/spree/security/advisories/GHSA-f8cm-364f-q9qh - Third Party Advisory () https://github.com/spree/spree/security/advisories/GHSA-f8cm-364f-q9qh - Third Party Advisory
CVSS v2 : 6.4
v3 : 9.1
v2 : 6.4
v3 : 7.4

Information

Published : 2020-10-20 21:15

Updated : 2024-11-21 05:05


NVD link : CVE-2020-15269

Mitre link : CVE-2020-15269

CVE.ORG link : CVE-2020-15269


JSON object : View

Products Affected

sparksolutions

  • spree
CWE
CWE-287

Improper Authentication

CWE-613

Insufficient Session Expiration