CVE-2013-0285 – nori
Package
Manager: gem
Name: nori
Vulnerable Version: >=2.0.0 <2.0.2 || >=1.1.0 <1.1.4 || >=1.0.0 <1.0.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.015 pctl0.80438
Details
nori contains Improper Input Validation The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
Metadata
Created: 2017-10-24T18:33:37Z
Modified: 2023-01-20T22:08:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-4936-rj25-6wm6/GHSA-4936-rj25-6wm6.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-4936-rj25-6wm6
Finding: F184
Auto approve: 1