CVE Vulnerabilities

CVE-2020-15269

Insufficient Session Expiration

Published: Oct 20, 2020 | Modified: Nov 18, 2021
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

In Spree before versions 3.7.11, 4.0.4, or 4.1.11, expired user tokens could be used to access Storefront API v2 endpoints. The issue is patched in versions 3.7.11, 4.0.4 and 4.1.11. A workaround without upgrading is described in the linked advisory.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Spree Sparksolutions * 3.7.11 (excluding)
Spree Sparksolutions 4.0.0 (including) 4.0.4 (excluding)
Spree Sparksolutions 4.1.0 (including) 4.1.11 (excluding)

Potential Mitigations

References