CVE-2011-10019

Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-08-13 21:15

Updated : 2025-09-24 00:31


NVD link : CVE-2011-10019

Mitre link : CVE-2011-10019

CVE.ORG link : CVE-2011-10019


JSON object : View

Products Affected

spreecommerce

  • spree
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')