Description
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-172-1 | libextlib-ruby security update |
Debian DSA |
DSA-2604-1 | rails security update |
Github GHSA |
GHSA-jmgw-6vjg-jjwg | actionpack Improper Input Validation vulnerability |
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T14:18:09.436Z
Reserved: 2012-12-06T00:00:00.000Z
Link: CVE-2013-0156
No data.
Status : Deferred
Published: 2013-01-13T22:55:00.947
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-0156
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA