CVE-2013-0156

Source
https://nvd.nist.gov/vuln/detail/CVE-2013-0156
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2013-0156.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2013-0156
Aliases
Related
Published
2013-01-13T22:55:00Z
Modified
2024-06-30T12:01:22Z
Summary
[none]
Details

activesupport/coreext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

References

Affected packages

Debian:11 / rails

Package

Name
rails
Purl
pkg:deb/debian/rails?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.14.1

Ecosystem specific

{
    "urgency": "high"
}

Debian:12 / rails

Package

Name
rails
Purl
pkg:deb/debian/rails?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.14.1

Ecosystem specific

{
    "urgency": "high"
}

Debian:13 / rails

Package

Name
rails
Purl
pkg:deb/debian/rails?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.14.1

Ecosystem specific

{
    "urgency": "high"
}