Lucene search

K
cve[email protected]CVE-2013-1756
HistoryJun 09, 2014 - 7:55 p.m.

CVE-2013-1756

2014-06-0919:55:06
CWE-94
web.nvd.nist.gov
46
cve-2013-1756
dragonfly gem
ruby
ruby on rails
remote code execution
vulnerability

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.8 High

AI Score

Confidence

Low

0.328 Low

EPSS

Percentile

97.1%

The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request.

Affected configurations

NVD
Node
mark_evansdragonfly_gemMatch0.7.0
OR
mark_evansdragonfly_gemMatch0.7.1
OR
mark_evansdragonfly_gemMatch0.7.2
OR
mark_evansdragonfly_gemMatch0.7.3
OR
mark_evansdragonfly_gemMatch0.7.4
OR
mark_evansdragonfly_gemMatch0.7.5
OR
mark_evansdragonfly_gemMatch0.7.6
OR
mark_evansdragonfly_gemMatch0.7.7
OR
mark_evansdragonfly_gemMatch0.8.0
OR
mark_evansdragonfly_gemMatch0.8.1
OR
mark_evansdragonfly_gemMatch0.8.2
OR
mark_evansdragonfly_gemMatch0.8.4
OR
mark_evansdragonfly_gemMatch0.8.5
OR
mark_evansdragonfly_gemMatch0.9.0
OR
mark_evansdragonfly_gemMatch0.9.1
OR
mark_evansdragonfly_gemMatch0.9.2
OR
mark_evansdragonfly_gemMatch0.9.3
OR
mark_evansdragonfly_gemMatch0.9.4
OR
mark_evansdragonfly_gemMatch0.9.5
OR
mark_evansdragonfly_gemMatch0.9.6
OR
mark_evansdragonfly_gemMatch0.9.7
OR
mark_evansdragonfly_gemMatch0.9.8
OR
mark_evansdragonfly_gemMatch0.9.9
OR
mark_evansdragonfly_gemMatch0.9.10
OR
mark_evansdragonfly_gemMatch0.9.11
OR
mark_evansdragonfly_gemMatch0.9.12
AND
ruby_on_railsruby_on_rails

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.8 High

AI Score

Confidence

Low

0.328 Low

EPSS

Percentile

97.1%