Sha256: 2ba7ebd619e641f8929af4cfb6e35c40fa203753f5df87b9ca062d945eee5287

Contents?: true

Size: 804 Bytes

Versions: 1

Compression:

Stored size: 804 Bytes

Contents

--- 
gem: activesupport
framework: rails
cve: 2013-0333
osvdb: 89594
url: https://nvd.nist.gov/vuln/detail/CVE-2013-0333
title:
  Ruby on Rails JSON Parser Crafted Payload YAML Subset Decoding Remote Code
  Execution 
date: 2013-01-28

description: |
  Ruby on Rails contains a flaw in the JSON parser. Rails supports multiple
  parsing backends, one of which involves transforming JSON into YAML via the
  YAML parser. With a specially crafted payload, an attacker can subvert the
  backend into decoding a subset of YAML. This may allow a remote attacker to
  bypass restrictions, allowing them to bypass authentication systems, inject
  arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on
  a Rails application.

cvss_v2: 9.3

patched_versions: 
  - ~> 2.3.16
  - ">= 3.0.20"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/activesupport/CVE-2013-0333.yml