Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xgr2-v94m-rc9g

Опубликовано: 24 окт. 2017
Источник: github
Github: Прошло ревью

Описание

activesupport in Rails vulnerable to incorrect data conversion

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

Пакеты

Наименование

activesupport

rubygems
Затронутые версииВерсия исправления

>= 2.3.2, < 2.3.16

2.3.16

Наименование

activesupport

rubygems
Затронутые версииВерсия исправления

>= 3.0.0, < 3.0.20

3.0.20

EPSS

Процентиль: 100%
0.91935
Критический

Дефекты

CWE-74

Связанные уязвимости

ubuntu
больше 12 лет назад

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

redhat
больше 12 лет назад

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

nvd
больше 12 лет назад

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

debian
больше 12 лет назад

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before ...

fstec
больше 12 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 100%
0.91935
Критический

Дефекты

CWE-74