Lucene search

K
githubGitHub Advisory DatabaseGHSA-JMGW-6VJG-JJWG
HistoryOct 24, 2017 - 6:33 p.m.

actionpack Improper Input Validation vulnerability

2017-10-2418:33:37
CWE-20
GitHub Advisory Database
github.com
41

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.973 High

EPSS

Percentile

99.9%

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

Affected configurations

Vulners
Node
actionpack_projectactionpackRange<3.2.11ruby
OR
actionpack_projectactionpackRange<3.1.10ruby
OR
actionpack_projectactionpackRange<3.0.19ruby
OR
actionpack_projectactionpackRange<2.3.15ruby

References

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.973 High

EPSS

Percentile

99.9%