Lucene search

K
nvd[email protected]NVD:CVE-2013-1756
HistoryJun 09, 2014 - 7:55 p.m.

CVE-2013-1756

2014-06-0919:55:06
CWE-94
web.nvd.nist.gov

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.328 Low

EPSS

Percentile

97.1%

The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request.

Affected configurations

NVD
Node
mark_evansdragonfly_gemMatch0.7.0
OR
mark_evansdragonfly_gemMatch0.7.1
OR
mark_evansdragonfly_gemMatch0.7.2
OR
mark_evansdragonfly_gemMatch0.7.3
OR
mark_evansdragonfly_gemMatch0.7.4
OR
mark_evansdragonfly_gemMatch0.7.5
OR
mark_evansdragonfly_gemMatch0.7.6
OR
mark_evansdragonfly_gemMatch0.7.7
OR
mark_evansdragonfly_gemMatch0.8.0
OR
mark_evansdragonfly_gemMatch0.8.1
OR
mark_evansdragonfly_gemMatch0.8.2
OR
mark_evansdragonfly_gemMatch0.8.4
OR
mark_evansdragonfly_gemMatch0.8.5
OR
mark_evansdragonfly_gemMatch0.9.0
OR
mark_evansdragonfly_gemMatch0.9.1
OR
mark_evansdragonfly_gemMatch0.9.2
OR
mark_evansdragonfly_gemMatch0.9.3
OR
mark_evansdragonfly_gemMatch0.9.4
OR
mark_evansdragonfly_gemMatch0.9.5
OR
mark_evansdragonfly_gemMatch0.9.6
OR
mark_evansdragonfly_gemMatch0.9.7
OR
mark_evansdragonfly_gemMatch0.9.8
OR
mark_evansdragonfly_gemMatch0.9.9
OR
mark_evansdragonfly_gemMatch0.9.10
OR
mark_evansdragonfly_gemMatch0.9.11
OR
mark_evansdragonfly_gemMatch0.9.12
AND
ruby_on_railsruby_on_rails

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.328 Low

EPSS

Percentile

97.1%