CVE-2013-0285
09.04.2013, 20:55
The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.Enginsight
Vendor | Product | Version |
---|---|---|
nori_gem_project | nori_gem | 2.0.0 |
nori_gem_project | nori_gem | 2.0.1 |
nori_gem_project | nori_gem | 1.1.0 |
nori_gem_project | nori_gem | 1.1.1 |
nori_gem_project | nori_gem | 1.1.2 |
nori_gem_project | nori_gem | 1.1.3 |
nori_gem_project | nori_gem | 1.0.0 |
nori_gem_project | nori_gem | 1.0.1 |
nori_gem_project | nori_gem | 1.0.2 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
rails |
| ||||||||||||||||||||||||||||
ruby-actionpack-2.3 |
| ||||||||||||||||||||||||||||
ruby-actionpack-3.2 |
|
Common Weakness Enumeration
References