Skip to content

Commit 9be358e

Browse files
authored
GHSA SYNC: 2 new advisories; 3 modified advisories (#989)
1 parent c5823cf commit 9be358e

File tree

3 files changed

+24
-18
lines changed

3 files changed

+24
-18
lines changed

gems/phlex/GHSA-w67g-2h6v-vjgq.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,4 +60,5 @@ related:
6060
- https://github.com/yippee-fun/phlex/commit/74e3d8610ffabc2cf5f241945e9df4b14dceb97d
6161
- https://github.com/yippee-fun/phlex/commit/9f56ad13bea9a7d6117fdfd510446c890709eeac
6262
- https://github.com/yippee-fun/phlex/commit/fe9ea708672f9fa42526d9b47e1cdc4634860ef1
63+
- https://advisories.gitlab.com/pkg/gem/phlex/GHSA-w67g-2h6v-vjgq
6364
- https://github.com/advisories/GHSA-w67g-2h6v-vjgq
Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
gem: spree_api
3+
cve: 2026-25758
34
ghsa: 87fh-rc96-6fr6
45
url: https://github.com/spree/spree/security/advisories/GHSA-87fh-rc96-6fr6
56
title: Unauthenticated Spree Commerce users can access all guest addresses
@@ -17,8 +18,8 @@ description: |
1718
1819
### Impact
1920
20-
This issue may lead to disclosure of PII of guest users (including
21-
names, addresses and phone numbers).
21+
This issue may lead to disclosure of PII of guest users
22+
(including names, addresses and phone numbers).
2223
2324
### Unauthenticated users can access all guest addresses (`GHSL-2026-027`)
2425
@@ -54,8 +55,8 @@ description: |
5455
5556
#### Impact
5657
57-
This issue may lead to disclosure of PII of guest users (including
58-
names, addresses and phone numbers).
58+
This issue may lead to disclosure of PII of guest users
59+
(including names, addresses and phone numbers).
5960
6061
#### CWEs
6162
@@ -64,8 +65,7 @@ description: |
6465
6566
### Credit
6667
67-
This issue was discovered with the [GitHub Security Lab Taskflow
68-
Agent](https://github.com/GitHubSecurityLab/seclab-taskflow-agent)
68+
This issue was discovered with the [GitHub Security Lab Taskflow Agent](https://github.com/GitHubSecurityLab/seclab-taskflow-agent)
6969
and manually verified by GHSL team members
7070
[@p- (Peter Stöckli)](https://github.com/p-) and
7171
[@m-y-mo (Man Yue Mo)](https://github.com/m-y-mo).
@@ -74,6 +74,7 @@ description: |
7474
7575
This report is subject to a 90-day disclosure deadline, as
7676
described in more detail in our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy).
77+
cvss_v4: 7.7
7778
patched_versions:
7879
- "~> 4.10.3"
7980
- "~> 5.0.8"
@@ -82,6 +83,7 @@ patched_versions:
8283
- ">= 5.3.2"
8384
related:
8485
url:
86+
- https://nvd.nist.gov/vuln/detail/CVE-2026-25758
8587
- https://github.com/spree/spree/security/advisories/GHSA-87fh-rc96-6fr6
8688
- https://github.com/spree/spree/commit/15619618e43b367617ec8d2d4aafc5e54fa7b734
8789
- https://github.com/spree/spree/commit/29282d1565ba4f7bc2bbc47d550e2c0c6d0ae59f
@@ -92,6 +94,5 @@ related:
9294
- https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/core/app/models/spree/order/checkout.rb#L241-L254
9395
- https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/core/app/services/spree/checkout/update.rb#L33-L48
9496
- https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/core/lib/spree/permitted_attributes.rb#L92-L96
97+
- https://advisories.gitlab.com/pkg/gem/spree_api/CVE-2026-25758
9598
- https://github.com/advisories/GHSA-87fh-rc96-6fr6
96-
notes: |
97-
- CVE-2026-25758 in GHSA Advisory.

gems/spree_storefront/GHSA-p6pv-q7rc-g4h9.yml renamed to gems/spree_storefront/CVE-2026-25757.yml

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
gem: spree_storefront
3+
cve: 2026-25757
34
ghsa: p6pv-q7rc-g4h9
45
url: https://github.com/spree/spree/security/advisories/GHSA-p6pv-q7rc-g4h9
56
title: Unauthenticated Spree Commerce users can view completed
@@ -12,14 +13,16 @@ description: |
1213
guest orders by order number alone, without requiring the
1314
associated order token.
1415
15-
Order lookup without enforcing token requirement in [`OrdersController#show`](https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L14):
16+
Order lookup without enforcing token requirement in
17+
[`OrdersController#show`](https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L14):
1618
1719
```ruby
1820
@order = complete_order_finder.new(number: params[:id],
1921
token: params[:token], store: current_store).execute.first
2022
```
2123
2224
Authorization bypass for guest orders in [`authorize_access`](https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L51C1-L55C8):
25+
2326
```ruby
2427
def authorize_access
2528
return true if @order.user_id.nil?
@@ -30,13 +33,13 @@ description: |
3033
3134
If the attacker is in possession of a leaked Order ID, they might
3235
look it up directly via this API.
33-
Alternatively, brute forcing all or parts of the possible
34-
Order IDs might be feasible for an attacker. (The Order IDs
35-
themselves are [securely generated](https://github.com/spree/spree/blob/a878eb4a782ce0445d218ea86fb12075b0e3d7cc/core/lib/spree/core/number_generator.rb#L45),
36-
but with relatively low entropy: by default an order ID has a
37-
length of 9 and a base of 10, that would require an attacker to
38-
perform 1 billion requests to gather all guest orders. (At an
39-
assumed constant rate of 100 requests per second it would take 115 days.)
36+
Alternatively, brute forcing all or parts of the possible Order IDs
37+
might be feasible for an attacker. (The Order IDs themselves are
38+
[securely generated](https://github.com/spree/spree/blob/a878eb4a782ce0445d218ea86fb12075b0e3d7cc/core/lib/spree/core/number_generator.rb#L45),
39+
but with relatively low entropy: by default an order ID has a length
40+
of 9 and a base of 10, that would require an attacker to perform
41+
1 billion requests to gather all guest orders. (At an assumed
42+
constant rate of 100 requests per second it would take 115 days.)
4043
4144
#### Impact
4245
@@ -58,13 +61,15 @@ description: |
5861
5962
This report is subject to a 90-day disclosure deadline, as
6063
described in more detail in our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy).
64+
cvss_v4: 7.7
6165
patched_versions:
6266
- "~> 5.0.8"
6367
- "~> 5.1.10"
6468
- "~> 5.2.7"
6569
- ">= 5.3.2"
6670
related:
6771
url:
72+
- https://nvd.nist.gov/vuln/detail/CVE-2026-25757
6873
- https://github.com/spree/spree/security/advisories/GHSA-p6pv-q7rc-g4h9
6974
- https://github.com/spree/spree/commit/3e00be64c128ef4bd4b99731f0c3ab469509cfab
7075
- https://github.com/spree/spree/commit/6b32ed7d474aa55fa441990e6aa39740152aa1be
@@ -73,6 +78,5 @@ related:
7378
- https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L14
7479
- https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L51C1-L55C8
7580
- https://github.com/spree/spree/blob/a878eb4a782ce0445d218ea86fb12075b0e3d7cc/core/lib/spree/core/number_generator.rb#L45
81+
- https://advisories.gitlab.com/pkg/gem/spree_storefront/CVE-2026-25757
7682
- https://github.com/advisories/GHSA-p6pv-q7rc-g4h9
77-
notes: |
78-
- CVE-2026-25757 in GHSA advisory.

0 commit comments

Comments
 (0)