Skip to content

Authentication Bypass by CSRF Weakness

Critical severity GitHub Reviewed Published Nov 17, 2021 in solidusio/solidus • Updated Jan 9, 2023

Package

bundler solidus_core (RubyGems)

Affected versions

< 2.11.12
>= 3.0.0, < 3.0.3
>= 3.1.0, < 3.1.3

Patched versions

2.11.12
3.0.3
3.1.3

Description

Impact

The actual vulnerability has been discovered on solidus_auth_devise. See GHSA-xm34-v85h-9pg2 for details.

The security advisory here exists to provide an extra layer of security in the form of a monkey patch for users who don't update solidus_auth_devise. For this reason, it has been marked as low impact on this end.

Patches

For extra security, update solidus_core to versions 3.1.3, 3.0.3 or 2.11.12.

Workarounds

Look at the workarounds described at GHSA-xm34-v85h-9pg2.

References

For more information

If you have any questions or comments about this advisory:

References

@waiting-for-dev waiting-for-dev published to solidusio/solidus Nov 17, 2021
Reviewed Nov 17, 2021
Published to the GitHub Advisory Database Nov 18, 2021
Last updated Jan 9, 2023

Severity

Critical
9.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

CVE ID

No known CVE

GHSA ID

GHSA-5629-8855-gf4g

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.