CVE-2013-0285
CVSS V2 High 7.5
CVSS V3 None
Description
The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
Overview
- CVE ID
- CVE-2013-0285
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Analyzed
- Published Version
- 2013-04-09T20:55:01
- Last Modified Date
- 2013-04-16T04:00:00
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:nori_gem_project:nori_gem:2.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:nori_gem_project:nori_gem:2.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:nori_gem_project:nori_gem:1.1.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:nori_gem_project:nori_gem:1.1.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:nori_gem_project:nori_gem:1.1.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:nori_gem_project:nori_gem:1.1.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:nori_gem_project:nori_gem:1.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:nori_gem_project:nori_gem:1.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:nori_gem_project:nori_gem:1.0.2:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 7.5
- Severity
- HIGH
- Exploitability Score
- 10
- Impact Score
- 6.4
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2013-0285 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0285 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 10:45:58 | Added to TrackCVE |