Описание
The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | 0.4.3-2 |
| devel | not-affected | |
| esm-apps/bionic | not-affected | 0.4.3-2 |
| esm-apps/focal | not-affected | |
| esm-apps/xenial | not-affected | 0.4.3-1 |
| esm-infra-legacy/trusty | DNE | |
| focal | not-affected | |
| groovy | not-affected | |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
Показывать по
Ссылки на источники
7.5 High
CVSS2
Связанные уязвимости
The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
The crack gem 0.3.1 and earlier for Ruby does not properly restrict ca ...
7.5 High
CVSS2