logo

CVE-2013-1802 extlib

Package

Manager: gem
Name: extlib
Vulnerable Version: >=0 <0.9.16

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.01686 pctl0.81495

Details

extlib does not properly restrict casts of string values The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Metadata

Created: 2017-10-24T18:33:37Z
Modified: 2023-01-23T20:56:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-9h36-4jf2-hx53/GHSA-9h36-4jf2-hx53.json
CWE IDs: ["CWE-704"]
Alternative ID: GHSA-9h36-4jf2-hx53
Finding: F113
Auto approve: 1