CVE-2010-3978:
Spree allows remote attackers to obtain sensitive information
5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/14/2022
Updated
8/29/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
spree | rubygems | >= 0.11.0, < 0.11.2 | 0.11.2 |
spree | rubygems | = 0.30.0.beta1 | 0.30.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing CSRF token validation in JSON endpoints. The patch adds 'before_filter :check_json_authenticity' to these controllers, confirming they previously lacked this protection. The commit diff shows these endpoints were vulnerable because they returned sensitive data without validating the authenticity token in GET requests, a classic JSON hijacking vector. The admin_token_passed_in_headers method in api/base_controller.rb was also vulnerable but primarily impacts API access rather than the admin UI endpoints explicitly mentioned in the CVE description.