Moderate severityNVD Advisory· Published Apr 5, 2012· Updated Apr 29, 2026
CVE-2008-7311
CVE-2008-7311
Description
The session cookie store implementation in Spree 0.2.0 uses a hardcoded config.action_controller_session hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the config/environment.rb file.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
spreeRubyGems | < 0.4.0 | 0.4.0 |
Affected products
1- cpe:2.3:a:spreecommerce:spree:0.2.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-store/nvdVendor Advisory
- github.com/advisories/GHSA-g466-57gh-cqfwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2008-7311ghsaADVISORY
- spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-storeghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2008-7311.ymlghsaWEB
- spreecommerce.com/blog/security-vulernability-session-cookie-storeghsaWEB
- web.archive.org/web/20090306033106/http://support.spreehq.org/issues/show/63ghsaWEB
- web.archive.org/web/20100309050152/http://rubygems.org/gems/spree/versionsghsaWEB
- web.archive.org/web/20101128024939/http://spreecommerce.com/blog/2008/08/12/security-vulernability-session-cookie-storeghsaWEB
- support.spreehq.org/issues/show/63nvd
News mentions
0No linked articles in our index yet.