CVE-2013-1854

The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.
References
Link Resource
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html
http://rhn.redhat.com/errata/RHSA-2013-0699.html
http://rhn.redhat.com/errata/RHSA-2014-1863.html
http://support.apple.com/kb/HT5784
http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html
http://rhn.redhat.com/errata/RHSA-2013-0699.html
http://rhn.redhat.com/errata/RHSA-2014-1863.html
http://support.apple.com/kb/HT5784
http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:2.3.17:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html - () http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html -
References () http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html - () http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html -
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html -
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html -
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html -
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html -
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0699.html - () http://rhn.redhat.com/errata/RHSA-2013-0699.html -
References () http://rhn.redhat.com/errata/RHSA-2014-1863.html - () http://rhn.redhat.com/errata/RHSA-2014-1863.html -
References () http://support.apple.com/kb/HT5784 - () http://support.apple.com/kb/HT5784 -
References () http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/ - () http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/ -
References () https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain - () https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain -

Information

Published : 2013-03-19 22:55

Updated : 2024-11-21 01:50


NVD link : CVE-2013-1854

Mitre link : CVE-2013-1854

CVE.ORG link : CVE-2013-1854


JSON object : View

Products Affected

rubyonrails

  • rails
  • ruby_on_rails

redhat

  • enterprise_linux
CWE
CWE-20

Improper Input Validation