Sha256: b4a92c347e881768dfaead20d5d089036214be875ca9f8a85740bbd7ec45927e
Contents?: true
Size: 682 Bytes
Versions: 1
Compression:
Stored size: 682 Bytes
Contents
--- gem: activerecord framework: rails cve: 2013-0277 osvdb: 90073 url: https://nvd.nist.gov/vuln/detail/CVE-2013-0277 title: | Ruby on Rails Active Record +serialize+ Helper YAML Attribute Handling Remote Code Execution date: 2013-02-11 description: | Ruby on Rails contains a flaw in the +serialize+ helper in the Active Record. The issue is triggered when the system is configured to allow users to directly provide values to be serialized and deserialized using YAML. With a specially crafted YAML attribute, a remote attacker can deserialize arbitrary YAML and execute code associated with it. cvss_v2: 10.0 patched_versions: - "~> 2.3.17" - ">= 3.1.0"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/activerecord/CVE-2013-0277.yml |