CVE-2013-0285

EUVD-2017-0160
The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 80%
Affected Products (NVD)
VendorProductVersion
nori_gem_projectnori_gem
2.0.0
nori_gem_projectnori_gem
2.0.1
nori_gem_projectnori_gem
1.1.0
nori_gem_projectnori_gem
1.1.1
nori_gem_projectnori_gem
1.1.2
nori_gem_projectnori_gem
1.1.3
nori_gem_projectnori_gem
1.0.0
nori_gem_projectnori_gem
1.0.1
nori_gem_projectnori_gem
1.0.2
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
rails
hardy
ignored
lucid
ignored
oneiric
not-affected
precise
not-affected
quantal
not-affected
raring
not-affected
saucy
not-affected
trusty
dne
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected
ruby-actionpack-2.3
hardy
dne
lucid
dne
oneiric
ignored
precise
ignored
quantal
ignored
raring
ignored
saucy
ignored
trusty
dne
utopic
dne
vivid
dne
wily
dne
xenial
dne
yakkety
dne
zesty
dne
ruby-actionpack-3.2
hardy
dne
lucid
dne
oneiric
dne
precise
dne
quantal
ignored
raring
ignored
saucy
not-affected
trusty
dne
utopic
dne
vivid
dne
wily
dne
xenial
dne
yakkety
dne
zesty
dne