[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-0269Date: (C)2013-02-13   (M)2023-12-22


The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-52075
SECUNIA-52774
SECUNIA-52902
BID-57899
OSVDB-90074
APPLE-SA-2013-10-22-5
RHSA-2013:0686
RHSA-2013:0701
RHSA-2013:1028
RHSA-2013:1147
SSA:2013-075-01
SUSE-SU-2013:0609
SUSE-SU-2013:0647
USN-1733-1
http://www.openwall.com/lists/oss-security/2013/02/11/7
http://www.openwall.com/lists/oss-security/2013/02/11/8
https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain
http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/
http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection
https://puppet.com/security/cve/cve-2013-0269
json-ruby-security-bypass(82010)
openSUSE-SU-2013:0603

CWE    1
CWE-20
OVAL    3
oval:org.secpod.oval:def:104707
oval:org.secpod.oval:def:104699
oval:org.secpod.oval:def:701179

© SecPod Technologies