Lucene search

K
cve[email protected]CVE-2013-2065
HistoryNov 02, 2013 - 7:55 p.m.

CVE-2013-2065

2013-11-0219:55:04
CWE-264
web.nvd.nist.gov
44
cve
2013
2065
ruby
dl
fiddle
security
vulnerability
taint checking
patchlevel
attackers
bypass

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

5.5 Medium

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.5%

(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.

Affected configurations

NVD
Node
opensuseopensuseMatch12.2
OR
opensuseopensuseMatch12.3
Node
ruby-langrubyMatch1.9
OR
ruby-langrubyMatch1.9.1
OR
ruby-langrubyMatch1.9.2
OR
ruby-langrubyMatch1.9.3
OR
ruby-langrubyMatch1.9.3p0
OR
ruby-langrubyMatch1.9.3p125
OR
ruby-langrubyMatch1.9.3p194
OR
ruby-langrubyMatch1.9.3p286
OR
ruby-langrubyMatch1.9.3p383
OR
ruby-langrubyMatch1.9.3p385
OR
ruby-langrubyMatch1.9.3p392
OR
ruby-langrubyMatch2.0
OR
ruby-langrubyMatch2.0.0
OR
ruby-langrubyMatch2.0.0p0
OR
ruby-langrubyMatch2.0.0preview1
OR
ruby-langrubyMatch2.0.0preview2
OR
ruby-langrubyMatch2.0.0rc1
OR
ruby-langrubyMatch2.0.0rc2

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

5.5 Medium

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.5%