CVE-2013-0156 – actionpack
Package
Manager: gem
Name: actionpack
Vulnerable Version: >=0 <2.3.15 || >=3.0.0 <3.0.19 || >=3.1.0 <3.1.10 || >=3.2.0 <3.2.11
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.91941 pctl0.99687
Details
actionpack Improper Input Validation vulnerability `active_support/core_ext/hash/conversions.rb` in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
Metadata
Created: 2017-10-24T18:33:37Z
Modified: 2023-02-15T22:22:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-jmgw-6vjg-jjwg/GHSA-jmgw-6vjg-jjwg.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-jmgw-6vjg-jjwg
Finding: F184
Auto approve: 1