Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0333

Опубликовано: 28 янв. 2013
Источник: redhat
CVSS2: 7.5
EPSS Критический

Описание

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Enterprise 1ruby193-rubygem-activesupportNot affected
Red Hat CloudForms Tools 1rubygem-activesupportWill not fix
CloudForms for RHEL 6katelloFixedRHSA-2013:020329.01.2013
CloudForms for RHEL 6rubygem-activesupportFixedRHSA-2013:020329.01.2013
Red Hat Subscription Asset Manager 1.1rubygem-activesupportFixedRHSA-2013:020128.01.2013
RHEL 6 Version of OpenShift Enterpriserubygem-activesupportFixedRHSA-2013:020228.01.2013

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=903440rubygem-activesupport: json to yaml parsing

EPSS

Процентиль: 100%
0.91935
Критический

7.5 High

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

nvd
больше 12 лет назад

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

debian
больше 12 лет назад

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before ...

github
почти 8 лет назад

activesupport in Rails vulnerable to incorrect data conversion

fstec
больше 12 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 100%
0.91935
Критический

7.5 High

CVSS2