Description
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
Published: 2013-01-30
Score: 7.5 High
EPSS: 91.9% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2613-1 rails security update
Github GHSA Github GHSA GHSA-xgr2-v94m-rc9g activesupport in Rails vulnerable to incorrect data conversion
History

No history.

Subscriptions

Cloudforms Cloudengine 1
Redhat Openshift
Rhel Sam 1.1
Rubyonrails Rails Ruby On Rails
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T14:25:09.069Z

Reserved: 2012-12-06T00:00:00.000Z

Link: CVE-2013-0333

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-01-30T12:00:08.930

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-0333

cve-icon Redhat

Severity : Critical

Publid Date: 2013-01-28T00:00:00Z

Links: CVE-2013-0333 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses