Sha256: ff9f91543131a0d62c1314614765af41f18bdde7c96b2c5bd099745433788532

Contents?: true

Size: 592 Bytes

Versions: 2

Compression:

Stored size: 592 Bytes

Contents

---
url: http://direct.osvdb.org/show/osvdb/90073
title: |
  Ruby on Rails Active Record +serialize+ Helper YAML Attribute Handling Remote
  Code Execution 

description: |
  Ruby on Rails contains a flaw in the +serialize+ helper in the Active Record.
  The issue is triggered when the system is configured to allow users to
  directly provide values to be serialized and deserialized using YAML.
  With a specially crafted YAML attribute, a remote attacker can deserialize
  arbitrary YAML and execute code associated with it.

cvss_v2: 10.0

patched_versions:
  - ~> 2.3.17
  - ">= 3.1.0"

Version data entries

2 entries across 2 versions & 1 rubygems

Version Path
bundler-audit-0.1.1 data/bundler/audit/rails/2013-0277.yml
bundler-audit-0.1.0 data/bundler/audit/rails/2013-0277.yml