CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
88.5%
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka “Unsafe Object Creation Vulnerability.”
lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html
lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
lists.opensuse.org/opensuse-updates/2013-04/msg00034.html
rhn.redhat.com/errata/RHSA-2013-0686.html
rhn.redhat.com/errata/RHSA-2013-0701.html
rhn.redhat.com/errata/RHSA-2013-1028.html
rhn.redhat.com/errata/RHSA-2013-1147.html
weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/
www.openwall.com/lists/oss-security/2013/02/11/7
www.openwall.com/lists/oss-security/2013/02/11/8
www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862
www.ubuntu.com/usn/USN-1733-1
www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection
exchange.xforce.ibmcloud.com/vulnerabilities/82010
github.com/advisories/GHSA-x457-cw4h-hq5f
github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2013-0269.yml
groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain
nvd.nist.gov/vuln/detail/CVE-2013-0269
web.archive.org/web/20130228082541/www.securityfocus.com/bid/57899
web.archive.org/web/20160331131233/spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
web.archive.org/web/20160808163226/https://puppet.com/security/cve/cve-2013-0269