Описание
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | contains no code |
| hardy | ignored | end of life |
| lucid | ignored | end of life |
| oneiric | not-affected | contains no code |
| precise | not-affected | contains no code |
| quantal | not-affected | contains no code |
| raring | not-affected | contains no code |
| saucy | not-affected | contains no code |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.3.14-6 |
| hardy | DNE | |
| lucid | DNE | |
| oneiric | released | 2.3.14-2ubuntu0.11.10.2 |
| precise | released | 2.3.14-2ubuntu0.12.04.2 |
| quantal | released | 2.3.14-4ubuntu0.2 |
| raring | not-affected | 2.3.14-6 |
| saucy | not-affected | 2.3.14-6 |
| upstream | released | 2.3.14-6 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| hardy | DNE | |
| lucid | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | not-affected | |
| raring | not-affected | |
| saucy | not-affected | |
| upstream | needs-triage |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before ...
activesupport in Rails vulnerable to incorrect data conversion
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.5 High
CVSS2