GHSA-pchc-949f-53m5

Suggest an improvement
Source
https://github.com/advisories/GHSA-pchc-949f-53m5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-pchc-949f-53m5/GHSA-pchc-949f-53m5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pchc-949f-53m5
Aliases
  • CVE-2013-0175
Published
2017-10-24T18:33:37Z
Modified
2024-12-04T05:42:01.958665Z
Summary
Improper Input Validation in multi_xml
Details

multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Database specific
{
    "nvd_published_at": "2013-04-25T23:55:00Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:48:50Z"
}
References

Affected packages

RubyGems / multi_xml

Package

Name
multi_xml
Purl
pkg:gem/multi_xml

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.2

Affected versions

0.*

0.0.1
0.1.0
0.1.1
0.1.2
0.1.3
0.1.4
0.2.0
0.2.1
0.2.2
0.3.0
0.4.0
0.4.1
0.4.2
0.4.3
0.4.4
0.5.0
0.5.1