Lucene search

K
nvd[email protected]NVD:CVE-2013-0285
HistoryApr 09, 2013 - 8:55 p.m.

CVE-2013-0285

2013-04-0920:55:01
CWE-20
web.nvd.nist.gov
1

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.1 High

AI Score

Confidence

High

0.973 High

EPSS

Percentile

99.9%

The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Affected configurations

NVD
Node
nori_gem_projectnori_gemMatch2.0.0
OR
nori_gem_projectnori_gemMatch2.0.1
Node
nori_gem_projectnori_gemMatch1.1.0
OR
nori_gem_projectnori_gemMatch1.1.1
OR
nori_gem_projectnori_gemMatch1.1.2
OR
nori_gem_projectnori_gemMatch1.1.3
Node
nori_gem_projectnori_gemMatch1.0.0
OR
nori_gem_projectnori_gemMatch1.0.1
OR
nori_gem_projectnori_gemMatch1.0.2

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.1 High

AI Score

Confidence

High

0.973 High

EPSS

Percentile

99.9%