CVE编号
CVE-2021-43805利用情况
暂无补丁情况
N/A披露时间
2021-12-08漏洞描述
Solidus is a free, open-source ecommerce platform built on Rails. Versions of Solidus prior to 3.1.4, 3.0.4, and 2.11.13 have a denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.` Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression. The maintainers added a check for email addresses that are no longer valid that will print information about any affected orders that exist. If a prompt upgrade is not an option, a workaround is available. It is possible to edit the file `config/application.rb` manually (with code provided by the maintainers in the GitHub Security Advisory) to check email validity.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401 | |
https://github.com/solidusio/solidus/security/advisories/GHSA-qxmr-qxh6-2cc9 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | nebulab | solidus | * |
Up to (excluding) 2.11.13 |
|||||
运行在以下环境 | |||||||||
应用 | nebulab | solidus | * |
From (including) 3.0.0 |
Up to (excluding) 3.0.4 |
||||
运行在以下环境 | |||||||||
应用 | nebulab | solidus | * |
From (including) 3.1.0 |
Up to (excluding) 3.1.4 |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...