CVE-2013-0285
Published: 9 April 2013
The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
Notes
Author | Note |
---|---|
mdeslaur | in Oneiric+, rails package is just for transition |
Priority
Status
Package | Release | Status |
---|---|---|
rails Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Ignored
(end of life)
|
|
oneiric |
Not vulnerable
(contains no code)
|
|
precise |
Not vulnerable
(contains no code)
|
|
quantal |
Not vulnerable
(contains no code)
|
|
raring |
Not vulnerable
(contains no code)
|
|
saucy |
Not vulnerable
(contains no code)
|
|
trusty |
Does not exist
(trusty was not-affected [contains no code])
|
|
upstream |
Released
(3.2.11, 3.1.10, 3.0.19, 2.3.15)
|
|
utopic |
Not vulnerable
(contains no code)
|
|
vivid |
Not vulnerable
(contains no code)
|
|
wily |
Not vulnerable
(contains no code)
|
|
xenial |
Not vulnerable
(contains no code)
|
|
yakkety |
Not vulnerable
(contains no code)
|
|
zesty |
Not vulnerable
(contains no code)
|
|
Patches: upstream: https://groups.google.com/group/rubyonrails-security/attach/c1432d0f8c70e89d/2-3-xml_parsing.patch?part=3 (2.3) upstream: https://groups.google.com/group/rubyonrails-security/attach/c1432d0f8c70e89d/3-0-xml_parsing.patch?part=4 (3.0) upstream: https://groups.google.com/group/rubyonrails-security/attach/c1432d0f8c70e89d/3-1-xml_parsing.patch?part=5 (3.1) upstream: https://groups.google.com/group/rubyonrails-security/attach/c1432d0f8c70e89d/3-2-xml_parsing.patch?part=6 (3.2) |
||
ruby-actionpack-2.3 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
|
|
upstream |
Ignored
(end of life)
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: https://groups.google.com/group/rubyonrails-security/attach/c1432d0f8c70e89d/2-3-xml_parsing.patch?part=3 (2.3) |
||
ruby-actionpack-3.2 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Not vulnerable
(3.2.13-7)
|
|
trusty |
Does not exist
(trusty was not-affected [3.2.16-3])
|
|
upstream |
Released
(3.2.11)
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: https://groups.google.com/group/rubyonrails-security/attach/c1432d0f8c70e89d/3-2-xml_parsing.patch?part=6 (3.2) |