logo

CVE-2013-0175 multi_xml

Package

Manager: gem
Name: multi_xml
Vulnerable Version: >=0 <0.5.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.01008 pctl0.76218

Details

Improper Input Validation in multi_xml multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Metadata

Created: 2017-10-24T18:33:37Z
Modified: 2023-02-13T17:01:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-pchc-949f-53m5/GHSA-pchc-949f-53m5.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-pchc-949f-53m5
Finding: F184
Auto approve: 1