7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.973 High
EPSS
Percentile
99.9%
The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156.
bugzilla.redhat.com/show_bug.cgi?id=917229
github.com/jnunemaker/httparty
github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031
github.com/rubysec/ruby-advisory-db/blob/master/gems/httparty/CVE-2013-1801.yml
nvd.nist.gov/vuln/detail/CVE-2013-1801
support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately
web.archive.org/web/20200229101716/www.securityfocus.com/bid/58260