spree_api 4.1.2
1 security vulnerability
found in version
4.1.2
Authorization bypass in Spree
high severity CVE-2020-26223
high severity
CVE-2020-26223
Patched versions:
~> 3.7.11
, ~> 4.0.4
, >= 4.1.11
Unaffected versions:
< 3.7.0
Impact
The perpetrator could query the [API v2 Order Status] (https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status) endpoint with an empty string passed as an Order token
Patches
Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected.
No officially reported memory leakage issues detected.
This gem version does not have any officially reported memory leaked issues.
No license issues detected.
This gem version has a license in the gemspec.
This gem version is available.
This gem version has not been yanked and is still available for usage.