Authentication Bypass by CSRF Weakness
Critical severity
GitHub Reviewed
Published
Nov 17, 2021
in
spree/spree_auth_devise
•
Updated May 4, 2023
Package
Affected versions
>= 4.3.0, < 4.4.1
>= 4.2.0, < 4.2.1
>= 4.1.0, < 4.1.1
< 4.0.1
Patched versions
4.4.1
4.2.1
4.1.1
4.0.1
Description
Published by the National Vulnerability Database
Nov 17, 2021
Reviewed
Nov 17, 2021
Published to the GitHub Advisory Database
Nov 18, 2021
Last updated
May 4, 2023
Impact
CSRF vulnerability that allows user account takeover.
All applications using any version of the frontend component of
spree_auth_devise
are affected ifprotect_from_forgery
method is both:That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
Thanks @waiting-for-dev for reporting and providing a patch 👏
Patches
Spree 4.3 users should update to spree_auth_devise 4.4.1
Spree 4.2 users should update to spree_auth_devise 4.2.1
Spree 4.1 users should update to spree_auth_devise 4.1.1
Older Spree version users should update to spree_auth_devise 4.0.1
Workarounds
If possible, change your strategy to :exception:
Add the following to
config/application.rb
to at least run the:exception
strategy on the affected controller:References
GHSA-xm34-v85h-9pg2
References