pysec-2021-355
Vulnerability from pysec
Published
2021-09-29 14:15
Modified
2021-09-30 23:26
Details
“Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.
Impacted products
Name | purl | shuup | pkg:pypi/shuup |
---|
Aliases
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "shuup", "purl": "pkg:pypi/shuup" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0a2db392e8518410c282412561461cd8797eea51" } ], "repo": "https://github.com/shuup/shuup", "type": "GIT" }, { "events": [ { "introduced": "0.4.2" }, { "fixed": "2.11.0" } ], "type": "ECOSYSTEM" } ], "versions": [ "1.10.0", "1.10.1", "1.10.10", "1.10.11", "1.10.12", "1.10.13", "1.10.14", "1.10.15", "1.10.16", "1.10.2", "1.10.3", "1.10.4", "1.10.5", "1.10.6", "1.10.7", "1.10.8", "1.10.9", "1.11.0", "1.11.1", "1.11.10", "1.11.3", "1.11.4", "1.11.5", "1.11.6", "1.11.7", "1.11.8", "1.11.9", "1.6.0", "1.6.15", "1.6.16", "1.6.3", "1.6.4", "1.6.5", "1.6.6", "1.6.7", "1.6.8", "1.6.9", "1.7.0", "1.7.1", "1.7.3", "1.8.0", "1.8.1", "1.8.2", "1.9.0", "1.9.1", "1.9.10", "1.9.11", "1.9.12", "1.9.13", "1.9.2", "1.9.3", "1.9.4", "1.9.5", "1.9.6", "1.9.7", "1.9.8", "1.9.9", "2.0.1", "2.0.2", "2.0.3", "2.0.4", "2.0.5", "2.0.6", "2.0.7", "2.0.8", "2.1.1", "2.1.10", "2.1.11", "2.1.12", "2.1.2", "2.1.3", "2.1.4", "2.1.5", "2.1.6", "2.1.7", "2.1.8", "2.10.0", "2.10.0b1", "2.10.1", "2.10.2", "2.10.3", "2.10.4", "2.10.5", "2.10.6", "2.10.7", "2.10.8", "2.2.0", "2.2.1", "2.2.10", "2.2.11", "2.2.2", "2.2.3", "2.2.4", "2.2.5", "2.2.6", "2.2.7", "2.2.8", "2.2.9", "2.3.0", "2.3.1", "2.3.10", "2.3.11", "2.3.12", "2.3.13", "2.3.14", "2.3.15", "2.3.16", "2.3.17", "2.3.18", "2.3.2", "2.3.3", "2.3.4", "2.3.5", "2.3.6", "2.3.7", "2.3.8", "2.3.9", "2.4.0", "2.5.0", "2.6.0", "2.6.2", "2.6.3", "2.6.4", "2.6.5", "2.7.0", "2.7.1", "2.7.2", "2.7.3", "2.8.0", "2.8.1", "2.8.3", "2.9.0", "2.9.1", "2.9.2" ] } ], "aliases": [ "CVE-2021-25962", "GHSA-663j-rjcr-789f" ], "details": "\u201cShuup\u201d application in versions 0.4.2 to 2.10.8 is affected by the \u201cFormula Injection\u201d vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.", "id": "PYSEC-2021-355", "modified": "2021-09-30T23:26:29.598032Z", "published": "2021-09-29T14:15:00Z", "references": [ { "type": "FIX", "url": "https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51" }, { "type": "WEB", "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-663j-rjcr-789f" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…