Lucene search

K
githubGitHub Advisory DatabaseGHSA-PCHC-949F-53M5
HistoryOct 24, 2017 - 6:33 p.m.

Improper Input Validation in multi_xml

2017-10-2418:33:37
CWE-20
GitHub Advisory Database
github.com
33

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.972

Percentile

99.9%

multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Affected configurations

Vulners
Node
erik_michaels-obermulti_xmlRange<0.5.2
VendorProductVersionCPE
erik_michaels-obermulti_xml*cpe:2.3:a:erik_michaels-ober:multi_xml:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.972

Percentile

99.9%