logo

CVE-2013-0285 nori

Package

Manager: gem
Name: nori
Vulnerable Version: >=2.0.0 <2.0.2 || >=1.1.0 <1.1.4 || >=1.0.0 <1.0.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.015 pctl0.80438

Details

nori contains Improper Input Validation The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Metadata

Created: 2017-10-24T18:33:37Z
Modified: 2023-01-20T22:08:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-4936-rj25-6wm6/GHSA-4936-rj25-6wm6.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-4936-rj25-6wm6
Finding: F184
Auto approve: 1