CVE-2013-1802 – extlib
Package
Manager: gem
Name: extlib
Vulnerable Version: >=0 <0.9.16
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.01686 pctl0.81495
Details
extlib does not properly restrict casts of string values The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
Metadata
Created: 2017-10-24T18:33:37Z
Modified: 2023-01-23T20:56:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-9h36-4jf2-hx53/GHSA-9h36-4jf2-hx53.json
CWE IDs: ["CWE-704"]
Alternative ID: GHSA-9h36-4jf2-hx53
Finding: F113
Auto approve: 1