Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-0333

Опубликовано: 30 янв. 2013
Источник: ubuntu
Приоритет: high
EPSS Критический
CVSS2: 7.5

Описание

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

РелизСтатусПримечание
devel

not-affected

contains no code
hardy

ignored

end of life
lucid

ignored

end of life
oneiric

not-affected

contains no code
precise

not-affected

contains no code
quantal

not-affected

contains no code
raring

not-affected

contains no code
saucy

not-affected

contains no code
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

2.3.14-6
hardy

DNE

lucid

DNE

oneiric

released

2.3.14-2ubuntu0.11.10.2
precise

released

2.3.14-2ubuntu0.12.04.2
quantal

released

2.3.14-4ubuntu0.2
raring

not-affected

2.3.14-6
saucy

not-affected

2.3.14-6
upstream

released

2.3.14-6

Показывать по

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

DNE

oneiric

DNE

precise

DNE

quantal

not-affected

raring

not-affected

saucy

not-affected

upstream

needs-triage

Показывать по

EPSS

Процентиль: 100%
0.91935
Критический

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

nvd
больше 12 лет назад

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

debian
больше 12 лет назад

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before ...

github
почти 8 лет назад

activesupport in Rails vulnerable to incorrect data conversion

fstec
больше 12 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 100%
0.91935
Критический

7.5 High

CVSS2