CVE-2013-0156

Priority
Description
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15,
3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not
properly restrict casts of string values, which allows remote attackers to
conduct object-injection attacks and execute arbitrary code, or cause a
denial of service (memory and CPU consumption) involving nested XML entity
references, by leveraging Action Pack support for (1) YAML type conversion
or (2) Symbol type conversion.
Notes
mdeslaurin Oneiric+, rails package is just for transition
jdstrandauthentication bypass actively being exploited
per Debian, on Ubuntu 11.10+, vulnerability is in
ruby-activesupport* for rails
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Source: rails (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [contains no code])
Patches:
Vendor:http://www.debian.org/security/2013/dsa-2604
Package
Upstream:released (2.3.14-5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.2.6-5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.2.6-5])
Package
Upstream:released (0.9.15-3)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [0.9.15-3])
More Information

Updated: 2020-01-29 19:45:44 UTC (commit 768ceb2fdee6790d707d0f681e1b54916744af1e)