Lucene search

K
saintSAINT CorporationSAINT:3D07B952F89BD863D8A787134DDF4EFE
HistoryFeb 15, 2013 - 12:00 a.m.

Ruby on Rails XML Processor YAML Deserialization

2013-02-1500:00:00
SAINT Corporation
download.saintcorporation.com
37

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.973 High

EPSS

Percentile

99.9%

Added: 02/15/2013
CVE: CVE-2013-0156
BID: 57187
OSVDB: 89026

Background

Ruby on Rails is a full stack, Web application framework optimized for sustainable programming productivity, allowing writing sound code by favoring convention over configuration.

Problem

Ruby on Rails versions prior to 2.3.15, 3.0.19, 3.1.10, and 3.2.11 contain a vulnerability in the way they handle casting string values when nesting XML entity references using YAML type conversion of Symbol type conversion.

Resolution

Update to the latest version of Ruby on Rails.

References

<http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/&gt;
<http://www.kb.cert.org/vuls/id/380039&gt;
<http://www.kb.cert.org/vuls/id/628463&gt;

Limitations

This exploit has been tested against Ruby on Rails 3.0.18 on CentOS 6 (Exec-Shield Enabled).

Platforms

Linux

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.973 High

EPSS

Percentile

99.9%