Lucene search

K
rubygemsRubySecRUBY:ACTIONPACK-2013-6417-100527
HistoryDec 02, 2013 - 8:00 p.m.

Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)

2013-12-0220:00:00
RubySec
rubysec.com
19

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.8%

The prior fix to CVE-2013-0155 was incomplete and the use of common
3rd party libraries can accidentally circumvent the protection. Due
to the way that Rack::Request and Rails::Request interact, it is
possible for a 3rd party or custom rack middleware to parse the
parameters insecurely and store them in the same key that Rails uses
for its own parameters. In the event that happens the application
will receive unsafe parameters and could be vulnerable to the earlier
vulnerability.

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.8%