Lucene search

K
cve[email protected]CVE-2013-1802
HistoryApr 09, 2013 - 8:55 p.m.

CVE-2013-1802

2013-04-0920:55:01
CWE-264
web.nvd.nist.gov
77
cve-2013-1802
security
ruby
object-injection
arbitrary code execution
denial of service
extlib gem
memory and cpu consumption

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.6 High

AI Score

Confidence

High

0.973 High

EPSS

Percentile

99.9%

The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Affected configurations

NVD
Node
dan_kubbextlibRange0.9.15
OR
dan_kubbextlibMatch0.9.2
OR
dan_kubbextlibMatch0.9.3
OR
dan_kubbextlibMatch0.9.4
OR
dan_kubbextlibMatch0.9.5
OR
dan_kubbextlibMatch0.9.6
OR
dan_kubbextlibMatch0.9.7
OR
dan_kubbextlibMatch0.9.8
OR
dan_kubbextlibMatch0.9.9
OR
dan_kubbextlibMatch0.9.10
OR
dan_kubbextlibMatch0.9.11
OR
dan_kubbextlibMatch0.9.12
OR
dan_kubbextlibMatch0.9.13
OR
dan_kubbextlibMatch0.9.14

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.6 High

AI Score

Confidence

High

0.973 High

EPSS

Percentile

99.9%