CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
EPSS
Percentile
30.5%
CSRF vulnerability allowing attackers to change the state of an order’s adjustments if they hold its number, and the execution happens on a store administrator’s computer.
Reproduction steps:
{your_site_url}/admin/orders/{order_number}/adjustments/unfinalize
.GET
request which could have been linked from any other site.{your_site_url}/admin/orders/{order_number}/adjustments/finalize
.That happened because both routes were handled as GET
requests, which are skipped by Rails anti-forgery protection.
Users should upgrade to solidus_backend v3.1.6, v3.0.6, or v2.11.16, depending on the major and minor versions in use.
If you have any questions or comments about this advisory:
Vendor | Product | Version | CPE |
---|---|---|---|
* | solidus_backend | * | cpe:2.3:a:*:solidus_backend:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-8639-qx56-r428
github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_backend/CVE-2022-31000.yml
github.com/solidusio/solidus/commit/de796a2e0be7f154cae48b46e267501559d9716c
github.com/solidusio/solidus/security/advisories/GHSA-8639-qx56-r428
nvd.nist.gov/vuln/detail/CVE-2022-31000
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
EPSS
Percentile
30.5%