Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2013-0156 | First vendor Publication | 2013-01-13 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0156 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:19664 | |||
Oval ID: | oval:org.mitre.oval:def:19664 | ||
Title: | DSA-2604-1 rails - insufficient input validation | ||
Description: | It was discovered that Rails, the Ruby web application development framework, performed insufficient validation on input parameters, allowing unintended type conversions. An attacker may use this to bypass authentication systems, inject arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on the application. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2604-1 CVE-2013-0156 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | rails |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Ruby on Rails XML Processor YAML Deserialization | More info here |
ExploitDB Exploits
id | Description |
---|---|
2013-01-29 | Ruby on Rails JSON Processor YAML Deserialization Code Execution |
2013-01-10 | Ruby on Rails XML Processor YAML Deserialization Code Execution |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Rails XML parameter parsing vulnerability exploitation attempt RuleID : 25288 - Revision : 10 - Type : SERVER-OTHER |
2014-01-10 | Rails XML parameter parsing vulnerability exploitation attempt RuleID : 25287 - Revision : 12 - Type : SERVER-OTHER |
Metasploit Database
id | Description |
---|---|
2020-05-23 | Ruby on Rails XML Processor YAML Deserialization Scanner |
2013-01-07 | Ruby on Rails XML Processor YAML Deserialization Code Execution |
2020-05-23 | Ruby on Rails JSON Processor YAML Deserialization Scanner |
2013-01-28 | Ruby on Rails JSON Processor YAML Deserialization Code Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-172.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-28.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-106.nasl - Type : ACT_GATHER_INFO |
2013-03-15 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2013-001.nasl - Type : ACT_GATHER_INFO |
2013-03-14 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_cda566a02df04eb0b70eed7a6fb0ab3c.nasl - Type : ACT_GATHER_INFO |
2013-02-05 | Name : The remote host is missing an update for OS X Server that fixes two security ... File : macosx_server_2_2_1.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0154.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2013-0635.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2013-0686.nasl - Type : ACT_GATHER_INFO |
2013-01-21 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2013-0568.nasl - Type : ACT_GATHER_INFO |
2013-01-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2604.nasl - Type : ACT_GATHER_INFO |
2013-01-09 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_ca5d327259e311e2853b00262d5ed8ee.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:32:59 |
|
2024-08-02 12:22:15 |
|
2024-08-02 01:06:30 |
|
2024-02-02 01:21:35 |
|
2024-02-01 12:06:19 |
|
2023-09-05 12:20:23 |
|
2023-09-05 01:06:14 |
|
2023-09-02 12:20:25 |
|
2023-09-02 01:06:19 |
|
2023-08-12 12:24:26 |
|
2023-08-12 01:06:21 |
|
2023-08-11 12:20:34 |
|
2023-08-11 01:06:31 |
|
2023-08-06 12:19:47 |
|
2023-08-06 01:06:21 |
|
2023-08-04 12:19:51 |
|
2023-08-04 01:06:24 |
|
2023-07-14 12:19:49 |
|
2023-07-14 01:06:18 |
|
2023-03-29 01:21:48 |
|
2023-03-28 12:06:26 |
|
2023-02-13 05:28:29 |
|
2023-02-02 21:28:40 |
|
2022-10-29 01:15:28 |
|
2022-10-11 12:17:43 |
|
2022-10-11 01:06:01 |
|
2021-05-05 01:11:53 |
|
2021-05-04 12:23:14 |
|
2021-04-22 01:27:46 |
|
2020-05-24 01:10:07 |
|
2020-05-23 13:17:01 |
|
2020-05-23 00:35:39 |
|
2019-08-09 12:05:15 |
|
2019-08-08 21:19:40 |
|
2019-06-07 12:04:55 |
|
2018-12-07 00:19:12 |
|
2017-12-09 09:22:19 |
|
2016-12-08 09:23:26 |
|
2016-09-10 01:00:55 |
|
2016-04-26 22:38:44 |
|
2015-03-27 13:27:54 |
|
2014-12-16 13:24:57 |
|
2014-06-14 13:34:10 |
|
2014-02-17 11:15:18 |
|
2014-01-19 21:29:06 |
|
2013-09-05 21:20:20 |
|
2013-05-21 17:18:51 |
|
2013-05-10 22:27:54 |
|
2013-03-16 18:31:01 |
|
2013-02-07 13:21:31 |
|
2013-01-30 21:19:05 |
|
2013-01-14 21:20:07 |
|
2013-01-14 13:19:46 |
|