lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html - | |
References | () http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0201.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0202.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0203.html - | |
References | () http://support.apple.com/kb/HT5784 - | |
References | () http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/ - | |
References | () http://www.debian.org/security/2013/dsa-2613 - | |
References | () http://www.kb.cert.org/vuls/id/628463 - US Government Resource | |
References | () https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source&output=gplain - Vendor Advisory | |
References | () https://puppet.com/security/cve/cve-2013-0333 - |
Information
Published : 2013-01-30 12:00
Updated : 2024-11-21 01:47
NVD link : CVE-2013-0333
Mitre link : CVE-2013-0333
CVE.ORG link : CVE-2013-0333
JSON object : View
Products Affected
rubyonrails
- rails
- ruby_on_rails
CWE