Spree Conf 2013
May 20 - 21 Washington DC
Learn More

Archive for February, 2013

New Split Shipments Branch

Coming Soon: Split Shipments!

We’ve been grappling with the issue of complex Spree stores that require sophisticated shipping and warehouse logic for several years now. While it has always been manageable to get this to work on individual store basis, a more general solution that would be useful for all stores has always eluded us (until now). We’re in the early stages, and it’s still very much a work in progress, but in the next version of Spree we’re going to be able to have that long sought after multiple shipment functionality.

Our Team is Hard at Work

Yesterday we kicked off an intensive all day hackathon to pick up on the considerable work already done by Chris Mar (shown below briefing some of our team members). We’re going to be working hard to finish the first cut this week and we will post a more detailed update once we’re done.

If you’re curious about what the code looks like you can follow along on the new split_shipments branch. We’re also pulling our community manager into the effort so we may be a little slower than normal this week getting to your questions and issues.

What type of improvements to shipping/warehouse/inventory functionality would you like to see?

Multiple Security Vulnerabilities Fixed

The Spree team was recently alerted to several potential security vulnerabilities. If you believe you’ve found a security vulnerability, please do not post publicly about it. Email us at security@spreecommerce.com and we will investigate and fix the issue as quickly as possible.

Spree Roles Mass-assignment Vulnerability

The first vulnerability reported pertains to a mass-assignment vulnerability with spree roles. By passing the right parameters while updating a user, that user is able to assign any existing role to themselves. This is fixed in the latest release. You are strongly encouraged to upgrade if you are using Spree 1.1.x, 1.2.x or 1.3.×.

Thanks to Laurens Nienhaus of asdfasdf.de, Web Entwicklung for reporting this.

Versions Affected

1.2.x, 1.3.x, Edge

The Fix

If you are using spree_auth_devise, run the following command to update to the latest version:

bundle update spree_auth_devise

1.1.x

It’s recommended that you update to v1.1.6. This release contains the security fix.

JSON Gem Object Creation Vulnerability

The second is related to an Unsafe Object Creation vulnerability found in the JSON gem. This vulnerability potentially affects all versions of Spree that are running an outdated JSON gem.

Versions Affected

All Versions

The problem is not with Spree itself but the json gem upon which it relies. By using the suggested fix below you can ensure you are running a secure version of the json gem.

The Fix

This is easily fixed by upgrading to the latest version of the JSON gem, which can be done by running the following command:

bundle update json

We have added a hard dependency on JSON to spree_core to ensure that in future versions of Spree you are using an unaffected version of the gem.

Thanks to Steve Root of Roots Kitchens Bedrooms Bathrooms for bringing this to our attention. More info on this vulnerability can be found on the rails-security group.

Unsafe Use of Constantize in Admin

The third vulnerability concerns unsafe reflections in parts of the Spree admin and affects any version of Spree >= 1.0.0. It is possible to instantiate an object of the user’s choice by passing the correct parameters to certain methods. As this vulnerability only pertains to the admin interface, we have not released a new version of Spree with this fix. However, this fix is available on Spree’s master branch as commit 70092eb.

Thanks to Gabriel Quadros of Conviso Application Security for reporting this.

Versions Affected

Spree 1.0.x - 1.3.x, Edge

The Fix

The problem can be addressed by updating to edge Spree. There is no urgent need to upgrade if you are running an affected version as long as your admin users can be trusted to not attempt a complicated technical exploit of this vulnerability.

Register Now for SpreeConf 2013

SpreeConf DC Registration Opens Today - Special Early Bird Rate

We’re excited to announce that registration for SpreeConf DC starts today. The conference will be held May 20th to 21st in Washington, DC. Keeping with tradition we’ve selected a unique venue for the conference, the Studio Theatre, Washington, DC’s premier location for contemporary theater. The conference hotel is located just a few blocks from the Studio Theatre and provides easy access to the National Mall and the White House.

The two day event includes:

  • A full day of training on Spree, Rails, and other topics
  • A second day of speakers from the e-commerce and Ruby space
  • Coffee, snacks, and lunch provided both days
  • Conference t-shirt
  • A board game night to welcome you to DC and meet fellow attendees
  • A happy hour and after party with the Spree team and conference speakers

Special Early Bird Price

We’re offering a special discount for folks who book their tickets early. The early bird conference registration rate is only $199. That’s a 30% discount off the regular ticket price of $299. SpreeConf NYC sold out quickly so make sure to get your tickets early. The early bird rate expires March 31st.

Full Speaker List and Talks to be Announced Shortly

We’re going to have another great lineup of excellent speakers from both inside and outside of the Spree Community. There will be talks geared towards both developers and store owners. Follow us on Twitter so you can be the first to know when the full line-up of speakers has been announced.

This project is maintained by a core team of developers and is freely available for commercial use under the terms of the New BSD License.

Spree, Spree Commerce and the Spree logo are all trademarks of Spree Commerce, Inc.