Executive Summary

Summary
Title rails security update
Informations
Name DSA-2620 First vendor Publication 2013-02-12
Vendor Debian Last vendor Modification 2013-02-12
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Two vulnerabilities were discovered in Ruby on Rails, a Ruby framework for web application development.

CVE-2013-0276 The blacklist provided by the attr_protected method could be bypassed with crafted requests, having an application-specific impact.

CVE-2013-0277 In some applications, the +serialize+ helper in ActiveRecord could be tricked into deserializing arbitrary YAML data, possibly leading to remote code execution.

For the stable distribution (squeeze), these problems have been fixed in version 2.3.5-1.2+squeeze7.

We recommend that you upgrade your rails packages.

Original Source

Url : http://www.debian.org/security/2013/dsa-2620

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:19688
 
Oval ID: oval:org.mitre.oval:def:19688
Title: DSA-2620-1 rails - several
Description: Two vulnerabilities were discovered in Ruby on Rails, a Ruby framework for web application development.
Family: unix Class: patch
Reference(s): DSA-2620-1
CVE-2013-0276
CVE-2013-0277
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): rails
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 104

Nessus® Vulnerability Scanner

Date Description
2014-12-15 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201412-28.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-152.nasl - Type : ACT_GATHER_INFO
2013-06-05 Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_SecUpd2013-002.nasl - Type : ACT_GATHER_INFO
2013-02-21 Name : The remote Fedora host is missing a security update.
File : fedora_2013-2351.nasl - Type : ACT_GATHER_INFO
2013-02-21 Name : The remote Fedora host is missing a security update.
File : fedora_2013-2391.nasl - Type : ACT_GATHER_INFO
2013-02-21 Name : The remote Fedora host is missing a security update.
File : fedora_2013-2398.nasl - Type : ACT_GATHER_INFO
2013-02-18 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_beab40bfc1ca4d2bad462f14bac8a968.nasl - Type : ACT_GATHER_INFO
2013-02-13 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2620.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 11:31:38
  • Multiple Updates
2013-02-13 21:22:15
  • Multiple Updates
2013-02-13 13:21:00
  • Multiple Updates
2013-02-13 00:21:17
  • First insertion