Lucene search

K
githubGitHub Advisory DatabaseGHSA-FHJ9-CJJH-27VM
HistoryOct 24, 2017 - 6:33 p.m.

Active Record contains deserialization of arbitrary YAML

2017-10-2418:33:37
CWE-502
GitHub Advisory Database
github.com
21

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.099 Low

EPSS

Percentile

94.9%

ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.

Affected configurations

Vulners
Node
activerecord_projectactiverecordRange<3.1.0ruby
OR
activerecord_projectactiverecordRange<2.3.17ruby
CPENameOperatorVersion
activerecordlt3.1.0
activerecordlt2.3.17

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.099 Low

EPSS

Percentile

94.9%