`solidus_frontend` is the cart and storefront for the Solidus e-commerce project. Versions of `solidus_frontend` prior to 3.1.5, 3.0.5, and 2.11.14 contain a cross-site request forgery (CSRF) vulnerability that allows a malicious site to add an item to the user's cart without their knowledge. Versions 3.1.5, 3.0.5, and 2.11.14 contain a patch for this issue. The patch adds CSRF token verification to the "Add to cart" action. Adding forgery protection to a form that missed it can have some side effects. Other CSRF protection strategies as well as a workaround involving modifcation to config/application.rb` are available. More details on these mitigations are available in the GitHub Security Advisory.
References
Link | Resource |
---|---|
https://github.com/solidusio/solidus/commit/4d17cacf066d9492fc04eb3a0b16084b47376d81 | Patch Third Party Advisory |
https://github.com/solidusio/solidus/commit/a1b9bf7f24f9b8684fc4d943eacb02b1926c77c6 | Patch Third Party Advisory |
https://github.com/solidusio/solidus/security/advisories/GHSA-h3fg-h5v3-vf8m | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-12-20 14:15
Updated : 2021-12-29 10:26
NVD link : CVE-2021-43846
Mitre link : CVE-2021-43846
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
nebulab
- solidus