logo
DATABASE RESOURCES PRICING ABOUT US

CVE-2013-0269

Description

The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability." #### Bugs * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700436> * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700471 (ruby1.9.1)> #### Notes Author| Note ---|--- [seth-arnold](<https://launchpad.net/~seth-arnold>) | 1.7 patch was updated, see second Google groups reference, the upstream patch URL given here is the updated patch.


Affected Package


OS OS Version Package Name Package Version
ubuntu 12.04 ruby-json any
ubuntu upstream ruby-json 1.7.7, 1.6.8, 1.5.5
ubuntu 12.04 ruby1.9.1 precise was released [1.9.3.0-1ubuntu2.5]
ubuntu 12.10 ruby1.9.1 1.9.3.194-1ubuntu1.3
ubuntu 13.04 ruby1.9.1 1.9.3.194-7ubuntu1
ubuntu 13.10 ruby1.9.1 1.9.3.194-7ubuntu1
ubuntu 14.04 ruby1.9.1 trusty was released [1.9.3.194-7ubuntu1]
ubuntu upstream ruby1.9.1 1.9.3.194-7
ubuntu 14.10 ruby1.9.1 1.9.3.194-7ubuntu1
ubuntu 15.04 ruby1.9.1 1.9.3.194-7ubuntu1

Related