Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-0156

Опубликовано: 13 янв. 2013
Источник: nvd
CVSS2: 7.5
EPSS Критический

Описание

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
Версия от 3.2.0 (включая) до 3.2.11 (исключая)
cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*
Версия до 2.3.15 (исключая)
cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*
Версия от 3.0.0 (включая) до 3.0.19 (исключая)
cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*
Версия от 3.1.0 (включая) до 3.1.10 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

EPSS

Процентиль: 100%
0.91907
Критический

7.5 High

CVSS2

Дефекты

CWE-20

Связанные уязвимости

ubuntu
около 13 лет назад

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

redhat
около 13 лет назад

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

debian
около 13 лет назад

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2. ...

github
больше 8 лет назад

actionpack Improper Input Validation vulnerability

EPSS

Процентиль: 100%
0.91907
Критический

7.5 High

CVSS2

Дефекты

CWE-20