Lucene search

K
ubuntucveUbuntu.comUB:CVE-2013-0269
HistoryFeb 12, 2013 - 12:00 a.m.

CVE-2013-0269

2013-02-1200:00:00
ubuntu.com
ubuntu.com
19

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.3%

The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for
Ruby allows remote attackers to cause a denial of service (resource
consumption) or bypass the mass assignment protection mechanism via a
crafted JSON document that triggers the creation of arbitrary Ruby symbols
or certain internal objects, as demonstrated by conducting a SQL injection
attack against Ruby on Rails, aka “Unsafe Object Creation Vulnerability.”

Bugs

Notes

Author Note
seth-arnold 1.7 patch was updated, see second Google groups reference, the upstream patch URL given here is the updated patch.
OSVersionArchitecturePackageVersionFilename
ubuntu12.04noarchruby1.9.1< 1.9.3.0-1ubuntu2.5UNKNOWN
ubuntu12.10noarchruby1.9.1< 1.9.3.194-1ubuntu1.3UNKNOWN
ubuntu13.04noarchruby1.9.1< 1.9.3.194-7ubuntu1UNKNOWN
ubuntu13.10noarchruby1.9.1< 1.9.3.194-7ubuntu1UNKNOWN
ubuntu14.04noarchruby1.9.1< 1.9.3.194-7ubuntu1UNKNOWN
ubuntu14.10noarchruby1.9.1< 1.9.3.194-7ubuntu1UNKNOWN
ubuntu15.04noarchruby1.9.1< 1.9.3.194-7ubuntu1UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.3%