The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html - | |
References | () http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html - | |
References | () http://support.apple.com/kb/HT5784 - | |
References | () http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/ - | |
References | () https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source&output=gplain - |
Information
Published : 2013-03-19 22:55
Updated : 2024-11-21 01:50
NVD link : CVE-2013-1856
Mitre link : CVE-2013-1856
CVE.ORG link : CVE-2013-1856
JSON object : View
Products Affected
rubyonrails
- rails
- ruby_on_rails
CWE
CWE-20
Improper Input Validation