Sha256: baeed9408a71c8421865f6d688bc80562b1939fe091233bc85d43361ef67b78a

Contents?: true

Size: 710 Bytes

Versions: 2

Compression:

Stored size: 710 Bytes

Contents

---
url: http://osvdb.org/show/osvdb/89594
title: |
  Ruby on Rails JSON Parser Crafted Payload YAML Subset Decoding Remote Code
  Execution 

description: |
  Ruby on Rails contains a flaw in the JSON parser. Rails supports multiple
  parsing backends, one of which involves transforming JSON into YAML via the
  YAML parser. With a specially crafted payload, an attacker can subvert the
  backend into decoding a subset of YAML. This may allow a remote attacker to
  bypass restrictions, allowing them to bypass authentication systems, inject
  arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on
  a Rails application.

cvss_v2: 9.3

patched_versions:
  - ~> 2.3.16
  - ">= 3.0.20"

Version data entries

2 entries across 2 versions & 1 rubygems

Version Path
bundler-audit-0.1.1 data/bundler/audit/rails/2013-0333.yml
bundler-audit-0.1.0 data/bundler/audit/rails/2013-0333.yml