Executive Summary
Summary | |
---|---|
Title | Ruby on Rails Action Pack framework insecurely typecasts YAML and Symbol XML parameters |
Informations | |||
---|---|---|---|
Name | VU#380039 | First vendor Publication | 2013-01-08 |
Vendor | VU-CERT | Last vendor Modification | 2013-01-11 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#380039Ruby on Rails Action Pack framework insecurely typecasts YAML and Symbol XML parametersOverviewThe Ruby on Rails Action Pack framework is susceptible to authentication bypass, SQL injection, arbitrary code execution, or denial of service. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThis vulnerability was reported to the Ruby on Rails security team by Ben Murphy, Magnus Holm, Felix Wilhelm, Darcy Laycock, Jonathan Rudenberg, Bryan Helmkamp, Benoist Claassen and Charlie Somerville. This document was written by Jared Allar. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/380039 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:19664 | |||
Oval ID: | oval:org.mitre.oval:def:19664 | ||
Title: | DSA-2604-1 rails - insufficient input validation | ||
Description: | It was discovered that Rails, the Ruby web application development framework, performed insufficient validation on input parameters, allowing unintended type conversions. An attacker may use this to bypass authentication systems, inject arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on the application. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2604-1 CVE-2013-0156 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | rails |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Ruby on Rails XML Processor YAML Deserialization | More info here |
ExploitDB Exploits
id | Description |
---|---|
2013-01-29 | Ruby on Rails JSON Processor YAML Deserialization Code Execution |
2013-01-10 | Ruby on Rails XML Processor YAML Deserialization Code Execution |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Rails XML parameter parsing vulnerability exploitation attempt RuleID : 25288 - Revision : 10 - Type : SERVER-OTHER |
2014-01-10 | Rails XML parameter parsing vulnerability exploitation attempt RuleID : 25287 - Revision : 12 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-172.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-28.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-106.nasl - Type : ACT_GATHER_INFO |
2013-03-15 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2013-001.nasl - Type : ACT_GATHER_INFO |
2013-03-14 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_cda566a02df04eb0b70eed7a6fb0ab3c.nasl - Type : ACT_GATHER_INFO |
2013-02-05 | Name : The remote host is missing an update for OS X Server that fixes two security ... File : macosx_server_2_2_1.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0154.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2013-0635.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2013-0686.nasl - Type : ACT_GATHER_INFO |
2013-01-21 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2013-0568.nasl - Type : ACT_GATHER_INFO |
2013-01-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2604.nasl - Type : ACT_GATHER_INFO |
2013-01-09 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_ca5d327259e311e2853b00262d5ed8ee.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2013-01-30 21:19:55 |
|
2013-01-14 21:20:59 |
|
2013-01-14 13:20:34 |
|
2013-01-12 05:18:14 |
|
2013-01-11 21:22:31 |
|
2013-01-10 13:20:49 |
|
2013-01-09 21:18:37 |
|
2013-01-09 00:20:47 |
|