All the vulnerabilites related to rubyonrails - ruby_on_rails
Vulnerability from fkie_nvd
Published
2013-03-19 22:55
Modified
2024-11-21 01:50
Severity ?
Summary
The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a : sequence.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0698.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1863.html
secalert@redhat.comhttp://support.apple.com/kb/HT5784
secalert@redhat.comhttp://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
secalert@redhat.comhttps://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0698.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1863.html
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5784
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain
Impacted products
Vendor Product Version
redhat enterprise_linux 6.0
rubyonrails rails 0.9.1
rubyonrails rails 0.9.2
rubyonrails rails 0.9.3
rubyonrails rails 0.9.4
rubyonrails rails 0.9.4.1
rubyonrails rails 0.10.0
rubyonrails rails 0.10.1
rubyonrails rails 0.11.0
rubyonrails rails 0.11.1
rubyonrails rails 0.12.0
rubyonrails rails 0.12.1
rubyonrails rails 0.13.0
rubyonrails rails 0.13.1
rubyonrails rails 0.14.1
rubyonrails rails 0.14.2
rubyonrails rails 0.14.3
rubyonrails rails 0.14.4
rubyonrails rails 1.0.0
rubyonrails rails 1.1.0
rubyonrails rails 1.1.1
rubyonrails rails 1.1.2
rubyonrails rails 1.1.3
rubyonrails rails 1.1.4
rubyonrails rails 1.1.5
rubyonrails rails 1.1.6
rubyonrails rails 1.2.0
rubyonrails rails 1.2.1
rubyonrails rails 1.2.2
rubyonrails rails 1.2.3
rubyonrails rails 1.2.4
rubyonrails rails 1.2.5
rubyonrails rails 1.2.6
rubyonrails rails 1.9.5
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.1
rubyonrails rails 2.0.2
rubyonrails rails 2.0.4
rubyonrails rails 2.1.0
rubyonrails rails 2.1.1
rubyonrails rails 2.1.2
rubyonrails rails 2.2.0
rubyonrails rails 2.2.1
rubyonrails rails 2.2.2
rubyonrails rails 2.3.0
rubyonrails rails 2.3.1
rubyonrails rails 2.3.2
rubyonrails rails 2.3.3
rubyonrails rails 2.3.4
rubyonrails rails 2.3.9
rubyonrails rails 2.3.10
rubyonrails rails 2.3.11
rubyonrails rails 2.3.12
rubyonrails rails 2.3.13
rubyonrails rails 2.3.14
rubyonrails rails 2.3.15
rubyonrails rails 2.3.16
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 0.5.0
rubyonrails ruby_on_rails 0.5.5
rubyonrails ruby_on_rails 0.5.6
rubyonrails ruby_on_rails 0.5.7
rubyonrails ruby_on_rails 0.6.0
rubyonrails ruby_on_rails 0.6.5
rubyonrails ruby_on_rails 0.7.0
rubyonrails ruby_on_rails 0.8.0
rubyonrails ruby_on_rails 0.8.5
rubyonrails ruby_on_rails 0.9.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails ruby_on_rails 3.1.11
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB938651-C874-4427-AF9B-E9564B258633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D59FAFB-5D48-4BD8-AD51-FF9A204E373D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE23CCE1-1713-4813-A0AB-1E10DBDA4D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "897109FF-2C37-458A-91A9-7407F3DFBC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "289B1633-AAF7-48BE-9A71-0577428EE531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947FD6D-CD0B-44EE-95B5-E513AF244905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3666B82-1880-4A43-900F-3656F3FB157A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06D18BA-A0AB-461B-B498-2F1759CBF37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBE7E0-C474-43A7-85E3-093C754A253F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7195418-A2E9-43E6-B29F-AEACC317E69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39485B13-3C71-4EC6-97CF-6C796650C5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B30A-65F0-4D63-9A09-B23E9FC8D550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62323F62-AD04-4F43-A566-718DDB4149CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E890B1-4237-4470-939A-4FC489E04520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F3B933-0F68-4F88-999C-0BE48BC88CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E13DAEA-F118-4CB2-88A5-54E3327B6B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33BF68-D887-4C67-8E8C-D2A6CD877FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFCB88D-D946-4510-8DDC-67C32A606589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E793287E-2BDA-4012-86F5-886B82510431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF706143-996C-4120-B620-3EDC977568DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7F32B-C760-4862-B6DB-C38FB2A9182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD68A034-73A2-4B1A-95DB-19AD3131F775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E78C912-E8FF-495F-B922-43C54D1E2180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B72C17-82C3-4930-9227-226C8E64C2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA59F311-B2B4-40EE-A878-64EF9F41581B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "035B47E9-A395-47D2-9164-A2A2CF878326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA55D29-C830-45EF-A3B3-BFA9EED88F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9356A6-D32A-487C-B743-1DA0D6C42FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C7616-8631-49AC-979C-4347067059AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC487B78-AAEA-4F0E-8C8B-F415013A381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CEB24FC-F068-4EBD-BDC8-AB5BC56130DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DF384-3992-43BF-8A5C-65FA53E9A77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7453BE5-91C8-42B2-9F75-FFE4038F29A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2FD44EB-E899-4FA8-985E-44B75134DDC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E13E309-2411-4E1D-B27F-BF5DDDD5D5C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E1C795F-CCAC-47AC-B809-BD5510310011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C230384C-A52A-4167-A07D-0E06138EE246",
              "versionEndIncluding": "2.3.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDC63D-6ED7-48AE-9D72-6419F54D4B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF12B2F-39D9-48D5-9620-DF378D199295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E1EAAF-7B49-498B-BFEB-357173824F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AD626-0AFA-4873-A701-C7716193A69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF69F60A-E8D3-4A4D-BBB5-DE42A1402262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D2B30-FF07-498B-A5E0-A77BAB402619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3141A-162C-4674-BD7B-E1539BAA0B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E73F12-0551-42D2-ACC3-223C98B69C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6BA0659-2287-4E95-B30D-2441CD96DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01A4699-32D3-459E-B731-4240C8157F71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F0635C-4EBF-4EA3-9756-A85A3BB5026B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a \u0026#x3a; sequence."
    },
    {
      "lang": "es",
      "value": "El sanitize helper en lib/action_controller/vendor/html-scanner/html/sanitizer.rb en el componente Action Pack en Ruby on Rails en versiones anteriores a 2.3.18, 3.0.x y 3.1.x en versiones anteriores a 3.1.12 y 3.2.x en versiones anteriores a 3.2.13 no maneja adecuadamente codificaci\u00f3n de caracteres : (dos puntos) en URLs, lo que hace que sea m\u00e1s f\u00e1cil para atacantes remotos llevar a cabo ataques de secuencias de comandos en sitios cruzados (XSS) a trav\u00e9s de un nombre de esquema manipulado, seg\u00fan lo demostrado incluyendo una secuencia :."
    }
  ],
  "id": "CVE-2013-1857",
  "lastModified": "2024-11-21T01:50:31.973",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-03-19T22:55:01.087",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-04-07 23:59
Modified
2024-11-21 02:47
Summary
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
secalert@redhat.comhttp://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3509
secalert@redhat.comhttp://www.securityfocus.com/bid/83725
secalert@redhat.comhttp://www.securitytracker.com/id/1035122
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ
secalert@redhat.comhttps://www.exploit-db.com/exploits/40086/
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3509
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/83725
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035122
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/40086/
Impacted products
Vendor Product Version
debian debian_linux 8.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.2
rubyonrails rails 4.0.3
rubyonrails rails 4.0.4
rubyonrails rails 4.0.4
rubyonrails rails 4.0.5
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.7
rubyonrails rails 4.0.8
rubyonrails rails 4.0.9
rubyonrails rails 4.0.10
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.1
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.3
rubyonrails rails 4.1.4
rubyonrails rails 4.1.5
rubyonrails rails 4.1.6
rubyonrails rails 4.1.6
rubyonrails rails 4.1.7
rubyonrails rails 4.1.7.1
rubyonrails rails 4.1.8
rubyonrails rails 4.1.9
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.12
rubyonrails rails 4.1.13
rubyonrails rails 4.1.14
rubyonrails rails 4.1.14
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.2
rubyonrails rails 4.2.3
rubyonrails rails 4.2.3
rubyonrails rails 4.2.4
rubyonrails rails 4.2.4
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5.1
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 4.1.14.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "254884EE-EBA4-45D0-9704-B5CB22569668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C913A56-959D-44F1-BD89-D246C66D1F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5D5BA926-38EE-47BE-9D16-FDCF360A503B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "18EA25F1-279A-4F1A-883D-C064369F592E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD794856-6F30-4ABF-8AE4-720BB75E6F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4199B8B-A6F9-4BFD-8D27-0E663D8C579D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11E76A3-FA5B-4038-AB52-3D7D5E54D8A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C583ACDE-55D5-4D2F-838F-BEC5BDCDE3B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "767C481D-6616-4CA9-9A9B-C994D9121796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5496953-0C5E-45F8-A7FB-240CEC2CCEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CA46B621-125E-497F-B2DE-91C989B25936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B3239443-2E19-4540-BA0C-05A27E44CB6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "104AC9CF-6611-4469-9852-7FDAF4EC7638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC9E1864-B1E5-42C3-B4AF-9A002916B66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AC91AA-6A9A-43B4-B3E9-A66A34B6E612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A462C151-982E-4A83-A376-025015F40645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "578CC013-776B-4868-B448-B7ACAF3AF832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C310EA3E-399A-48FD-8DE9-6950E328CF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "293B2998-5169-4960-BEC4-21DAC837E32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "FB42A8E7-D273-4CE2-9182-D831D8089BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DB757DFD-BF47-4483-A2C0-DF37F7D10989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6C375F2-5027-4B55-9112-C5DD2F787E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8D57F-9849-428C-B8E9-D0A1020728BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0359DA8-6B41-46C5-AA95-41B1B366DD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0965BDB6-9644-465C-AA32-9278B2D53197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B15CF-37C1-4C9B-8457-4A8C9A480188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "072EB16D-1325-4869-B156-65E786A834C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "847B3C3D-8656-404D-A954-09C159EDC8E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CA2D50-B33C-4088-BDDF-EB964C9A092C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CADB5989-5260-4F60-ACF2-BEB6D7F97654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "509597D0-22E1-4BE8-95AD-C54FE4D15FA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B86E26CB-2376-4EBC-913C-B354E2D6711B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "539C550D-FEDD-415E-95AE-40E1AE2BAF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5150753-E86D-4859-A046-97B83EAE2C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C5B869-74FC-4051-A103-A721332B3CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F11E9791-7BCE-43E5-A4BA-6449623FE4F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CE521626-2876-455C-9D99-DB74726DC724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2DFDD32E-F49E-47F7-B033-B6C3C0E07FC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "DCBA26F1-FBBA-444D-9C14-F15AB14A4FC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "16D3B0EA-49F7-401A-A1D9-437429D33EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "17EBD8B4-C4D3-44A6-9DC1-89D948F126A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FCB08CD7-E9B9-454F-BAF7-96162D177677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0D3DA0B4-E374-4ED4-8C3B-F723C968666F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B1730A9A-6810-4470-AE6C-A5356D5BFF43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "709A19A5-8FD1-4F9C-A38C-F06242A94D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8104482C-E8F5-40A7-8B27-234FEF725FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF8677-EA00-4F7E-BFF9-272482206DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8D7DF5CD-DA28-492D-B5EE-D252ECCC8D96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "85435026-9855-4BF4-A436-832628B005FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56C2308F-A590-47B0-9791-7865D189196F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9A266882-DABA-4A4C-88E6-60E993EE0947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F1142C-3BFB-4B72-A033-81E20DB19D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1FA738A1-227B-4665-B65E-666883FFAE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6F00718C-A9E8-4E85-8DA6-33BF11F2DCCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "10789A2D-6401-4119-BFBE-2EE4C16216D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "70ABD462-7142-4831-8EB6-801EC1D05573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D717DB-7C80-48AA-A774-E291D2E75D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "06B357FB-0307-4EFA-9C5B-3C2CDEA48584",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E4BD8840-0F1C-49D3-B843-9CFE64948018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D5B492-43F9-470F-BD21-6EFD93E78453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4EC1F602-D48C-458A-A063-4050BE3BB25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A1C015-56AD-489C-B301-68CF1DBF1BEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD191625-ACE2-46B6-9AAD-12D682C732C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "02C7DB56-267B-4057-A9BA-36D1E58C6282",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC163D49-691B-4125-A983-6CF6F6D86DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD4FBDC-F05B-4CDD-8928-7122397A7651",
              "versionEndIncluding": "3.2.22.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91AB2B26-A6F1-44D2-92EB-8078DD6FD63A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application\u0027s unrestricted use of the render method."
    },
    {
      "lang": "es",
      "value": "Action Pack en Ruby on Rails en versiones anteriores a 3.2.22.2, 4.x en versiones anteriores a 4.1.14.2 y 4.2.x en versiones anteriores a 4.2.5.2 permite a atacantes remotos ejecutar c\u00f3digo Ruby arbitrario aprovechando el uso no restringido del m\u00e9todo render de una aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2016-2098",
  "lastModified": "2024-11-21T02:47:48.067",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-07T23:59:06.643",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3509"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/83725"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1035122"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.exploit-db.com/exploits/40086/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3509"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/83725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035122"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/40086/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2024-11-21 01:55
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/translation_helper.rb in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1794.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0008.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1863.html
secalert@redhat.comhttp://secunia.com/advisories/57836
secalert@redhat.comhttp://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/
secalert@redhat.comhttp://www.debian.org/security/2014/dsa-2888
secalert@redhat.comhttp://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
secalert@redhat.comhttp://www.securityfocus.com/bid/64076
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ
secalert@redhat.comhttps://puppet.com/security/cve/cve-2013-4491
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1794.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0008.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1863.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/57836
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2888
af854a3a-2127-422b-91ae-364da2661108http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/64076
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ
af854a3a-2127-422b-91ae-364da2661108https://puppet.com/security/cve/cve-2013-4491
Impacted products
Vendor Product Version
rubyonrails rails *
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 3.0.4
rubyonrails ruby_on_rails 3.1.11
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.15
rubyonrails ruby_on_rails 3.2.15



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:*:-:*:*:*:*:*:*",
              "matchCriteriaId": "1FDABDDD-F2B1-4335-ABB9-76B58AEE9CCF",
              "versionEndIncluding": "4.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "75842F7D-B1B1-48BA-858F-01148867B3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE65D701-AA6E-48E4-B62B-C22DEE863503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17B1E475-C873-4561-9348-027721C08D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F53FB7-A292-4273-BFBE-E231235E845D",
              "versionEndIncluding": "3.2.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F0635C-4EBF-4EA3-9756-A85A3BB5026B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A325F57E-0055-4279-9ED7-A26E75FC38E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9A3BA4AE-B4F0-4204-AFA1-1016F0A6F7AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "991F368C-CEB5-4DE6-A7EE-C341F358A4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01DB164E-E08E-4649-84BD-15B4159A3AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E0F7ECFB-86A1-4F00-AD47-971FA23C6D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/translation_helper.rb in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de cross-site scripting (XSS) en actionpack/lib/action_view/helpers/translation_helper.rb en el componente internationalization en Ruby on Rails 3.x anteriores a 3.2.16 y 4.x anteriores a 4.0.2 permite a atacantes remotos inyectar scripts web o HTML arbitrarios a trav\u00e9s de cadenas de texto manipuladas que activan la generaci\u00f3n de una cadena de fallback en la gema i18n."
    }
  ],
  "id": "CVE-2013-4491",
  "lastModified": "2024-11-21T01:55:40.540",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-12-07T00:55:03.553",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/57836"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2014/dsa-2888"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/64076"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://puppet.com/security/cve/cve-2013-4491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/57836"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/64076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://puppet.com/security/cve/cve-2013-4491"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-08-14 21:04
Modified
2024-11-21 00:15
Severity ?
Summary
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
References
cve@mitre.orghttp://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.htmlPatch
cve@mitre.orghttp://secunia.com/advisories/21466Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/21749Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1016673
cve@mitre.orghttp://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbitsPatch
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200608-20.xmlPatch, Vendor Advisory
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_21_sr.html
cve@mitre.orghttp://www.securityfocus.com/bid/19454Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3237Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21466Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21749Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016673
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbitsPatch
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200608-20.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_21_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19454Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3237Vendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB938651-C874-4427-AF9B-E9564B258633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D59FAFB-5D48-4BD8-AD51-FF9A204E373D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE23CCE1-1713-4813-A0AB-1E10DBDA4D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "897109FF-2C37-458A-91A9-7407F3DFBC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "289B1633-AAF7-48BE-9A71-0577428EE531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947FD6D-CD0B-44EE-95B5-E513AF244905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3666B82-1880-4A43-900F-3656F3FB157A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06D18BA-A0AB-461B-B498-2F1759CBF37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBE7E0-C474-43A7-85E3-093C754A253F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7195418-A2E9-43E6-B29F-AEACC317E69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39485B13-3C71-4EC6-97CF-6C796650C5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B30A-65F0-4D63-9A09-B23E9FC8D550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62323F62-AD04-4F43-A566-718DDB4149CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E890B1-4237-4470-939A-4FC489E04520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F3B933-0F68-4F88-999C-0BE48BC88CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E13DAEA-F118-4CB2-88A5-54E3327B6B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33BF68-D887-4C67-8E8C-D2A6CD877FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFCB88D-D946-4510-8DDC-67C32A606589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E793287E-2BDA-4012-86F5-886B82510431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81365A89-D8F1-435A-B13B-C746C9FDCE67",
              "versionEndIncluding": "1.1.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDC63D-6ED7-48AE-9D72-6419F54D4B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF12B2F-39D9-48D5-9620-DF378D199295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E1EAAF-7B49-498B-BFEB-357173824F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AD626-0AFA-4873-A701-C7716193A69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF69F60A-E8D3-4A4D-BBB5-DE42A1402262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D2B30-FF07-498B-A5E0-A77BAB402619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3141A-162C-4674-BD7B-E1539BAA0B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E73F12-0551-42D2-ACC3-223C98B69C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6BA0659-2287-4E95-B30D-2441CD96DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01A4699-32D3-459E-B731-4240C8157F71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with \"severe\" or \"serious\" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112."
    },
    {
      "lang": "es",
      "value": "Ruby on Rails anterior a 1.1.5 permite a un atacante remoto ejecutar c\u00f3digo Ruby con un impacto \"severo\" o \"serio\" a trav\u00e9s de una respuesta File Upload con una cabecera HTTP que modifica la variable LOAD_PATH, una vulnerabilidad diferente que CVE-2006-4112."
    }
  ],
  "evaluatorSolution": "This vulnerability is fully addressed in the following product release:\r\nRuby on Rails, Ruby on Rails, 1.1.6",
  "id": "CVE-2006-4111",
  "lastModified": "2024-11-21T00:15:11.260",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-14T21:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21466"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21749"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016673"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19454"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3237"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21466"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016673"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/3237"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-03-19 22:55
Modified
2024-11-21 01:50
Severity ?
Summary
The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0699.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1863.html
secalert@redhat.comhttp://support.apple.com/kb/HT5784
secalert@redhat.comhttp://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
secalert@redhat.comhttps://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0699.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1863.html
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5784
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain
Impacted products
Vendor Product Version
rubyonrails rails 2.3.0
rubyonrails rails 2.3.1
rubyonrails rails 2.3.2
rubyonrails rails 2.3.3
rubyonrails rails 2.3.4
rubyonrails rails 2.3.9
rubyonrails rails 2.3.10
rubyonrails rails 2.3.11
rubyonrails rails 2.3.12
rubyonrails rails 2.3.13
rubyonrails rails 2.3.14
rubyonrails rails 2.3.15
rubyonrails rails 2.3.16
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails ruby_on_rails 2.3.17
rubyonrails ruby_on_rails 3.1.11
redhat enterprise_linux 6.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CEB24FC-F068-4EBD-BDC8-AB5BC56130DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DF384-3992-43BF-8A5C-65FA53E9A77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7453BE5-91C8-42B2-9F75-FFE4038F29A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2FD44EB-E899-4FA8-985E-44B75134DDC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E13E309-2411-4E1D-B27F-BF5DDDD5D5C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E1C795F-CCAC-47AC-B809-BD5510310011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:2.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B144F6C7-865D-4AD9-92F9-0D65AB3183DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F0635C-4EBF-4EA3-9756-A85A3BB5026B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method."
    },
    {
      "lang": "es",
      "value": "El componente Active Record en Ruby on Rails v2.3.x anterior a v2.3.18, v3.1.x anterior a v3.1.12, y v3.2.x anterior a v3.2.13, procesa determinadas consultas mediante la conversi\u00f3n de los hash de las claves a s\u00edmbolos, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de una entrada manipulada al m\u00e9todo \"where\"."
    }
  ],
  "id": "CVE-2013-1854",
  "lastModified": "2024-11-21T01:50:31.507",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-03-19T22:55:01.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0699.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0699.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2024-11-21 01:59
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the number_to_currency helper in actionpack/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1794.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0008.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1863.html
secalert@redhat.comhttp://secunia.com/advisories/56093
secalert@redhat.comhttp://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2014/dsa-2888
secalert@redhat.comhttp://www.securityfocus.com/bid/64077
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ
secalert@redhat.comhttps://puppet.com/security/cve/cve-2013-6415
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1794.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0008.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1863.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56093
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2888
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/64077
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ
af854a3a-2127-422b-91ae-364da2661108https://puppet.com/security/cve/cve-2013-6415
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 3.0.4
rubyonrails ruby_on_rails 3.1.11
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.15
rubyonrails ruby_on_rails 3.2.15
rubyonrails rails *
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "75842F7D-B1B1-48BA-858F-01148867B3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE65D701-AA6E-48E4-B62B-C22DEE863503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17B1E475-C873-4561-9348-027721C08D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F53FB7-A292-4273-BFBE-E231235E845D",
              "versionEndIncluding": "3.2.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F0635C-4EBF-4EA3-9756-A85A3BB5026B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A325F57E-0055-4279-9ED7-A26E75FC38E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9A3BA4AE-B4F0-4204-AFA1-1016F0A6F7AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "991F368C-CEB5-4DE6-A7EE-C341F358A4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01DB164E-E08E-4649-84BD-15B4159A3AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E0F7ECFB-86A1-4F00-AD47-971FA23C6D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:*:-:*:*:*:*:*:*",
              "matchCriteriaId": "1FDABDDD-F2B1-4335-ABB9-76B58AEE9CCF",
              "versionEndIncluding": "4.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the number_to_currency helper in actionpack/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad Cross-site scripting (XSS) en number_to_currency en actionpack/lib/action_view/helpers/number_helper.rb en Ruby on Rails anterior a v3.2.16 y v4.x anterior a v4.0.2 permite a atacantes remotos inyectar script web o HTML arbitrario a trav\u00e9s del par\u00e1metro \"unit\"."
    }
  ],
  "id": "CVE-2013-6415",
  "lastModified": "2024-11-21T01:59:10.743",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-12-07T00:55:03.710",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/56093"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2014/dsa-2888"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/64077"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://puppet.com/security/cve/cve-2013-6415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/56093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/64077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://puppet.com/security/cve/cve-2013-6415"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-07-07 11:01
Modified
2024-11-21 02:08
Severity ?
Summary
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting.
Impacted products
Vendor Product Version
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.1
rubyonrails rails 2.0.2
rubyonrails rails 2.0.4
rubyonrails rails 2.1.0
rubyonrails rails 2.1.1
rubyonrails rails 2.1.2
rubyonrails rails 2.2.0
rubyonrails rails 2.2.1
rubyonrails rails 2.2.2
rubyonrails rails 2.3.0
rubyonrails rails 2.3.1
rubyonrails rails 2.3.2
rubyonrails rails 2.3.3
rubyonrails rails 2.3.4
rubyonrails rails 2.3.9
rubyonrails rails 2.3.10
rubyonrails rails 2.3.11
rubyonrails rails 2.3.12
rubyonrails rails 2.3.13
rubyonrails rails 2.3.14
rubyonrails rails 2.3.15
rubyonrails rails 2.3.16
rubyonrails rails 2.3.18
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.15
rubyonrails rails 3.2.16
rubyonrails rails 3.2.17
rubyonrails rails 3.2.18
rubyonrails ruby_on_rails 2.3.17
rubyonrails ruby_on_rails 3.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CEB24FC-F068-4EBD-BDC8-AB5BC56130DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DF384-3992-43BF-8A5C-65FA53E9A77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7453BE5-91C8-42B2-9F75-FFE4038F29A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2FD44EB-E899-4FA8-985E-44B75134DDC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E13E309-2411-4E1D-B27F-BF5DDDD5D5C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E1C795F-CCAC-47AC-B809-BD5510310011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "93E0C324-E7F4-4316-B078-BA13F69F10D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE65D701-AA6E-48E4-B62B-C22DEE863503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17B1E475-C873-4561-9348-027721C08D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.15:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6646610D-279B-4AEC-B445-981E7784EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F51980-EAD9-4E4D-A2E7-1FACFA80AAB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC02A7D1-CB1A-4793-86E3-CF88D0BCDF83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A499584B-6E2E-42F3-B0CE-DA7BDD732897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:2.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B144F6C7-865D-4AD9-92F9-0D65AB3183DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb en el adaptador PostgreSQL para Active Record en Ruby on Rails 2.x y 3.x anterior a 3.2.19 permite a atacantes remotos ejecutar comandos SQL arbitrarios mediante el aprovechamiento del citado de bitstrings indebido."
    }
  ],
  "id": "CVE-2014-3482",
  "lastModified": "2024-11-21T02:08:12.260",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-07-07T11:01:30.527",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2014/07/02/5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0876.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59973"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/60214"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/60763"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2014/dsa-2982"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/68343"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2014/07/02/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0876.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59973"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60763"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/68343"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-07-10 15:30
Modified
2024-11-21 01:04
Severity ?
Summary
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.
References
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlMailing List
cve@mitre.orghttp://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3sExploit, Patch
cve@mitre.orghttp://secunia.com/advisories/35702Broken Link, Vendor Advisory
cve@mitre.orghttp://support.apple.com/kb/HT4077Third Party Advisory
cve@mitre.orghttp://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digestPatch
cve@mitre.orghttp://www.securityfocus.com/bid/35579Broken Link, Patch, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1802Broken Link, Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/51528Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3sExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35702Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digestPatch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/35579Broken Link, Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1802Broken Link, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/51528Third Party Advisory, VDB Entry
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E594206-CF9B-4C01-947C-79EF74B57416",
              "versionEndExcluding": "2.3.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F110744D-9928-4DC1-873E-26B3E1D7CD62",
              "versionEndExcluding": "10.6.3",
              "versionStartIncluding": "10.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1335E35A-D381-4056-9E78-37BC6DF8AD98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3611024-49F5-414A-B536-9FA6519856B5",
              "versionEndExcluding": "10.6.3",
              "versionStartIncluding": "10.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82B4CD59-9F37-4EF0-BA43-427CFD6E1329",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password."
    },
    {
      "lang": "es",
      "value": "El c\u00f3digo de ejemplo para la funcionalidad de autenticaci\u00f3n digest (http_authentication.rb) en Ruby on Rails anterior a v2.3.3 define un bloque authenticate_or_request_with_http_digest que devolver\u00e1 nulo en lugar de falso cuando el usuario no existe, lo cual permite a atacantes dependiendo del contexto eludir la autenticaci\u00f3n para aplicaciones que se derivan de este ejemplo mediante el env\u00edo de un nombre de usuario no v\u00e1lido sin una contrase\u00f1a."
    }
  ],
  "id": "CVE-2009-2422",
  "lastModified": "2024-11-21T01:04:50.073",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2009-07-10T15:30:00.250",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35702"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/35579"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1802"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51528"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35702"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/35579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1802"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51528"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-08-29 18:55
Modified
2024-11-21 01:29
Severity ?
Summary
Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name.
References
secalert@redhat.comhttp://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplainPatch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
secalert@redhat.comhttp://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6Patch
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2301
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/17/1Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/19/11Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/20/1Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/13Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/14
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/5Patch
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=731438Patch
secalert@redhat.comhttps://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85Patch
af854a3a-2127-422b-91ae-364da2661108http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplainPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2301
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/17/1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/19/11Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/20/1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/13Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/14
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/5Patch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=731438Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85Patch



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en el m\u00e9todo quote_table_name en el adaptador ActiveRecord de activerecord/lib/active_record/connection_adapters/ in Ruby on Rails antes de v2.3.13, v3.0.x antes de v3.0.10, y v3.1.x antes de v3.1.0.rc5, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de un nombre de columna modificado."
    }
  ],
  "id": "CVE-2011-2930",
  "lastModified": "2024-11-21T01:29:17.973",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-08-29T18:55:01.457",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2301"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731438"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-13 10:55
Modified
2024-11-21 01:36
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements.
References
secalert@redhat.comhttp://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html
secalert@redhat.comhttp://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2466
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/03/02/6
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/03/03/1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=799276
af854a3a-2127-422b-91ae-364da2661108http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2466
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/03/02/6
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/03/03/1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=799276
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en  actionpack/lib/action_view/helpers/form_options_helper.rb en \"select helper\" de Ruby on Rails 3.0.x anteriores a 3.0.12, 3.1.x anteriores a 3.1.4, y 3.2.x anteriores a 3.2.2 permite a atacantes remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s de vectores que involucran la generaci\u00f3n de elementos OPTION dentro de elementos SELECT."
    }
  ],
  "id": "CVE-2012-1099",
  "lastModified": "2024-11-21T01:36:25.073",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-03-13T10:55:01.260",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2466"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799276"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2466"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799276"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-01-13 22:55
Modified
2024-11-21 01:46
Severity ?
Summary
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
References
secalert@redhat.comhttp://ics-cert.us-cert.gov/advisories/ICSA-13-036-01AThird Party Advisory, US Government Resource
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Mar/msg00002.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0153.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0154.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0155.htmlThird Party Advisory
secalert@redhat.comhttp://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2604Third Party Advisory
secalert@redhat.comhttp://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.htmlThird Party Advisory
secalert@redhat.comhttp://www.insinuator.net/2013/01/rails-yaml/Third Party Advisory
secalert@redhat.comhttp://www.kb.cert.org/vuls/id/380039Third Party Advisory, US Government Resource
secalert@redhat.comhttp://www.kb.cert.org/vuls/id/628463Third Party Advisory, US Government Resource
secalert@redhat.comhttps://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156Third Party Advisory
secalert@redhat.comhttps://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source&output=gplainThird Party Advisory
secalert@redhat.comhttps://puppet.com/security/cve/cve-2013-0156Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01AThird Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0153.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0154.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0155.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2604Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.insinuator.net/2013/01/rails-yaml/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/380039Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/628463Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source&output=gplainThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://puppet.com/security/cve/cve-2013-0156Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1D9248-14D7-4EA2-B416-D76FBA64E329",
              "versionEndExcluding": "3.2.11",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B28BEC17-EF03-4790-ACB3-89F615269803",
              "versionEndExcluding": "2.3.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC513BC8-F945-46A9-A63F-22585232DAE8",
              "versionEndExcluding": "3.0.19",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08C05EBE-B0D8-48F5-8C69-5801000189BA",
              "versionEndExcluding": "3.1.10",
              "versionStartIncluding": "3.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion."
    },
    {
      "lang": "es",
      "value": "active_support/core_ext/hash/conversions.rb en Ruby on Rails anterior a v2.3.15, v3.0.x anterior a v3.0.19, v3.1.x anterior a v3.1.10, y v3.2.x anterior a v3.2.11 no restringe adecuadamente el \"casting\" de las variables de tipo cadena, lo que permite a atacantes remotos llevar a cabo ataques de inyecci\u00f3n de objetos y la ejecuci\u00f3n de c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (consumo de memoria y CPU) involucrando  a referencias de entidades XML anidadas, aprovechando el soporte de Action Pack para lso tipos de conversion (1) YAML o (2) Symbol."
    }
  ],
  "id": "CVE-2013-0156",
  "lastModified": "2024-11-21T01:46:57.547",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-01-13T22:55:00.947",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0153.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2013/dsa-2604"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.insinuator.net/2013/01/rails-yaml/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/380039"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/628463"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://puppet.com/security/cve/cve-2013-0156"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0153.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2013/dsa-2604"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.insinuator.net/2013/01/rails-yaml/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/380039"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/628463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://puppet.com/security/cve/cve-2013-0156"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-09-30 17:22
Modified
2024-11-21 00:50
Severity ?
Summary
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
References
cve@mitre.orghttp://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1Exploit
cve@mitre.orghttp://gist.github.com/8946
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
cve@mitre.orghttp://rails.lighthouseapp.com/projects/8994/tickets/288Patch
cve@mitre.orghttp://rails.lighthouseapp.com/projects/8994/tickets/964Patch
cve@mitre.orghttp://secunia.com/advisories/31875Exploit, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31909Exploit, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31910Exploit, Vendor Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/09/13/2
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/09/16/1
cve@mitre.orghttp://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/Exploit
cve@mitre.orghttp://www.securityfocus.com/bid/31176
cve@mitre.orghttp://www.securitytracker.com/id?1020871
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2562Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/45109
af854a3a-2127-422b-91ae-364da2661108http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1Exploit
af854a3a-2127-422b-91ae-364da2661108http://gist.github.com/8946
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://rails.lighthouseapp.com/projects/8994/tickets/288Patch
af854a3a-2127-422b-91ae-364da2661108http://rails.lighthouseapp.com/projects/8994/tickets/964Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31875Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31909Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31910Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/09/13/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/09/16/1
af854a3a-2127-422b-91ae-364da2661108http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31176
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020871
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2562Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/45109



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB938651-C874-4427-AF9B-E9564B258633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D59FAFB-5D48-4BD8-AD51-FF9A204E373D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE23CCE1-1713-4813-A0AB-1E10DBDA4D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "897109FF-2C37-458A-91A9-7407F3DFBC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "289B1633-AAF7-48BE-9A71-0577428EE531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947FD6D-CD0B-44EE-95B5-E513AF244905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3666B82-1880-4A43-900F-3656F3FB157A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06D18BA-A0AB-461B-B498-2F1759CBF37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBE7E0-C474-43A7-85E3-093C754A253F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7195418-A2E9-43E6-B29F-AEACC317E69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39485B13-3C71-4EC6-97CF-6C796650C5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B30A-65F0-4D63-9A09-B23E9FC8D550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62323F62-AD04-4F43-A566-718DDB4149CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E890B1-4237-4470-939A-4FC489E04520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F3B933-0F68-4F88-999C-0BE48BC88CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E13DAEA-F118-4CB2-88A5-54E3327B6B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33BF68-D887-4C67-8E8C-D2A6CD877FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFCB88D-D946-4510-8DDC-67C32A606589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E793287E-2BDA-4012-86F5-886B82510431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF706143-996C-4120-B620-3EDC977568DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7F32B-C760-4862-B6DB-C38FB2A9182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD68A034-73A2-4B1A-95DB-19AD3131F775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E78C912-E8FF-495F-B922-43C54D1E2180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B72C17-82C3-4930-9227-226C8E64C2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA59F311-B2B4-40EE-A878-64EF9F41581B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "035B47E9-A395-47D2-9164-A2A2CF878326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA55D29-C830-45EF-A3B3-BFA9EED88F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9356A6-D32A-487C-B743-1DA0D6C42FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C7616-8631-49AC-979C-4347067059AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC487B78-AAEA-4F0E-8C8B-F415013A381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CE42D86-A8FE-493F-9AB6-4E032E9294FF",
              "versionEndIncluding": "2.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDC63D-6ED7-48AE-9D72-6419F54D4B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF12B2F-39D9-48D5-9620-DF378D199295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E1EAAF-7B49-498B-BFEB-357173824F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AD626-0AFA-4873-A701-C7716193A69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF69F60A-E8D3-4A4D-BBB5-DE42A1402262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D2B30-FF07-498B-A5E0-A77BAB402619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3141A-162C-4674-BD7B-E1539BAA0B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E73F12-0551-42D2-ACC3-223C98B69C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6BA0659-2287-4E95-B30D-2441CD96DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01A4699-32D3-459E-B731-4240C8157F71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer."
    },
    {
      "lang": "es",
      "value": "\"M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Ruby on Rails anterior a versi\u00f3n 2.1.1, permiten a los atacantes remotos ejecutar comandos SQL arbitrarios por medio de los par\u00e1metros (1): limit y (2): offset, relacionados con ActiveRecord, ActiveSupport, ActiveResource, ActionPack y ActionMailer."
    }
  ],
  "id": "CVE-2008-4094",
  "lastModified": "2024-11-21T00:50:52.997",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-09-30T17:22:09.147",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://gist.github.com/8946"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://rails.lighthouseapp.com/projects/8994/tickets/288"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://rails.lighthouseapp.com/projects/8994/tickets/964"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31875"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31909"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31910"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/09/13/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/09/16/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/31176"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020871"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2562"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://gist.github.com/8946"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://rails.lighthouseapp.com/projects/8994/tickets/288"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://rails.lighthouseapp.com/projects/8994/tickets/964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31910"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/09/13/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/09/16/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/31176"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020871"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2562"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45109"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-01-13 22:55
Modified
2024-11-21 01:46
Severity ?
Summary
Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.
References
secalert@redhat.comhttp://ics-cert.us-cert.gov/advisories/ICSA-13-036-01AThird Party Advisory, US Government Resource
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Jun/msg00000.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00079.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00081.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00082.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00003.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0154.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0155.htmlThird Party Advisory
secalert@redhat.comhttp://support.apple.com/kb/HT5784Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2609Third Party Advisory
secalert@redhat.comhttps://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source&output=gplainThird Party Advisory
secalert@redhat.comhttps://puppet.com/security/cve/cve-2013-0155Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01AThird Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0154.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0155.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5784Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2609Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source&output=gplainThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://puppet.com/security/cve/cve-2013-0155Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1D9248-14D7-4EA2-B416-D76FBA64E329",
              "versionEndExcluding": "3.2.11",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC513BC8-F945-46A9-A63F-22585232DAE8",
              "versionEndExcluding": "3.0.19",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08C05EBE-B0D8-48F5-8C69-5801000189BA",
              "versionEndExcluding": "3.1.10",
              "versionStartIncluding": "3.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain \"[nil]\" values, a related issue to CVE-2012-2660 and CVE-2012-2694."
    },
    {
      "lang": "es",
      "value": "Ruby on Rails v3.0.x anteior a v3.0.19, v3.1.x anteior a v3.1.10, y v3.2.x anteior a v3.2.11 no considera adecuadamente las diferencias en el manejo de par\u00e1metros entre el componente Active Record y la implementaci\u00f3n JSON, lo que permite a atacantes remotos evitar las restricciones de peticiones a base de datos y realizar chequeos NULL o provocar un WHERE a trav\u00e9s de una consulta manipulada. Como se ha demostrado mdiante determinados valires \"[nil]\". Relacionado con los CVE-2012-2660 y CVE-2012-2694."
    }
  ],
  "id": "CVE-2013-0155",
  "lastModified": "2024-11-21T01:46:57.407",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-01-13T22:55:00.900",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2013/dsa-2609"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://puppet.com/security/cve/cve-2013-0155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2013/dsa-2609"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://puppet.com/security/cve/cve-2013-0155"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-02-16 02:59
Modified
2024-11-21 02:37
Summary
activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0296.html
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3464
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2016/01/25/10
secalert@redhat.comhttp://www.securityfocus.com/bid/81806
secalert@redhat.comhttp://www.securitytracker.com/id/1034816
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=ruby-security-ann/cawsWcQ6c8g/LATIsglZEgAJ
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0296.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3464
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2016/01/25/10
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/81806
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1034816
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=ruby-security-ann/cawsWcQ6c8g/LATIsglZEgAJ
Impacted products
Vendor Product Version
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.2
rubyonrails rails 4.0.3
rubyonrails rails 4.0.4
rubyonrails rails 4.0.4
rubyonrails rails 4.0.5
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.7
rubyonrails rails 4.0.8
rubyonrails rails 4.0.9
rubyonrails rails 4.0.10
rubyonrails rails 4.0.10
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.1
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.3
rubyonrails rails 4.1.4
rubyonrails rails 4.1.5
rubyonrails rails 4.1.6
rubyonrails rails 4.1.6
rubyonrails rails 4.1.6
rubyonrails rails 4.1.7
rubyonrails rails 4.1.7.1
rubyonrails rails 4.1.8
rubyonrails rails 4.1.9
rubyonrails rails 4.1.9
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.12
rubyonrails rails 4.1.12
rubyonrails rails 4.1.13
rubyonrails rails 4.1.13
rubyonrails rails 4.1.14
rubyonrails rails 4.1.14
rubyonrails rails 4.1.14
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.2
rubyonrails rails 4.2.3
rubyonrails rails 4.2.3
rubyonrails rails 4.2.4
rubyonrails rails 4.2.4
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5
rubyonrails rails 5.0.0
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 4.0.10
rubyonrails ruby_on_rails 4.0.11
rubyonrails ruby_on_rails 4.0.11.1
rubyonrails ruby_on_rails 4.0.12
rubyonrails ruby_on_rails 4.0.13
rubyonrails ruby_on_rails 4.0.13
rubyonrails ruby_on_rails 4.1.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "254884EE-EBA4-45D0-9704-B5CB22569668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C913A56-959D-44F1-BD89-D246C66D1F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5D5BA926-38EE-47BE-9D16-FDCF360A503B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "18EA25F1-279A-4F1A-883D-C064369F592E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD794856-6F30-4ABF-8AE4-720BB75E6F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4199B8B-A6F9-4BFD-8D27-0E663D8C579D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11E76A3-FA5B-4038-AB52-3D7D5E54D8A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C583ACDE-55D5-4D2F-838F-BEC5BDCDE3B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "767C481D-6616-4CA9-9A9B-C994D9121796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5496953-0C5E-45F8-A7FB-240CEC2CCEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CA46B621-125E-497F-B2DE-91C989B25936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B3239443-2E19-4540-BA0C-05A27E44CB6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "104AC9CF-6611-4469-9852-7FDAF4EC7638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC9E1864-B1E5-42C3-B4AF-9A002916B66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AC91AA-6A9A-43B4-B3E9-A66A34B6E612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A462C151-982E-4A83-A376-025015F40645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "660C2AD2-CEC8-4391-84AF-27515A88B29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "578CC013-776B-4868-B448-B7ACAF3AF832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C310EA3E-399A-48FD-8DE9-6950E328CF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "293B2998-5169-4960-BEC4-21DAC837E32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "FB42A8E7-D273-4CE2-9182-D831D8089BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DB757DFD-BF47-4483-A2C0-DF37F7D10989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6C375F2-5027-4B55-9112-C5DD2F787E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8D57F-9849-428C-B8E9-D0A1020728BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0359DA8-6B41-46C5-AA95-41B1B366DD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0965BDB6-9644-465C-AA32-9278B2D53197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B15CF-37C1-4C9B-8457-4A8C9A480188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "072EB16D-1325-4869-B156-65E786A834C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "847B3C3D-8656-404D-A954-09C159EDC8E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CA2D50-B33C-4088-BDDF-EB964C9A092C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CADB5989-5260-4F60-ACF2-BEB6D7F97654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9036E3C7-0AD5-489D-BCEE-31DFE13F5ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "509597D0-22E1-4BE8-95AD-C54FE4D15FA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B86E26CB-2376-4EBC-913C-B354E2D6711B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "539C550D-FEDD-415E-95AE-40E1AE2BAF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5150753-E86D-4859-A046-97B83EAE2C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C5B869-74FC-4051-A103-A721332B3CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C31EBD2-CD2D-4D38-AA51-A5A56487939A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F11E9791-7BCE-43E5-A4BA-6449623FE4F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FBD4E4-0BCD-49E1-BA84-86621B7C4556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CE521626-2876-455C-9D99-DB74726DC724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2DFDD32E-F49E-47F7-B033-B6C3C0E07FC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "DCBA26F1-FBBA-444D-9C14-F15AB14A4FC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "16D3B0EA-49F7-401A-A1D9-437429D33EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D1EB17-EE67-48E5-B637-AA9A75D397F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "17EBD8B4-C4D3-44A6-9DC1-89D948F126A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2B1711A-5541-412C-A5A0-274CEAB9E387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FCB08CD7-E9B9-454F-BAF7-96162D177677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3AF00C3-93D9-4284-BCB9-40E42CB8386E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0D3DA0B4-E374-4ED4-8C3B-F723C968666F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B1730A9A-6810-4470-AE6C-A5356D5BFF43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A68D41F-36A9-4B77-814D-996F4E48FA79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "709A19A5-8FD1-4F9C-A38C-F06242A94D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8104482C-E8F5-40A7-8B27-234FEF725FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF8677-EA00-4F7E-BFF9-272482206DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8D7DF5CD-DA28-492D-B5EE-D252ECCC8D96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "85435026-9855-4BF4-A436-832628B005FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56C2308F-A590-47B0-9791-7865D189196F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9A266882-DABA-4A4C-88E6-60E993EE0947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F1142C-3BFB-4B72-A033-81E20DB19D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1FA738A1-227B-4665-B65E-666883FFAE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6F00718C-A9E8-4E85-8DA6-33BF11F2DCCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "10789A2D-6401-4119-BFBE-2EE4C16216D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "70ABD462-7142-4831-8EB6-801EC1D05573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D717DB-7C80-48AA-A774-E291D2E75D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "06B357FB-0307-4EFA-9C5B-3C2CDEA48584",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E4BD8840-0F1C-49D3-B843-9CFE64948018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D5B492-43F9-470F-BD21-6EFD93E78453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4EC1F602-D48C-458A-A063-4050BE3BB25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A1C015-56AD-489C-B301-68CF1DBF1BEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD191625-ACE2-46B6-9AAD-12D682C732C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "02C7DB56-267B-4057-A9BA-36D1E58C6282",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "AF8F94CF-D504-4165-A69E-3F1198CB162A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C068362-0D49-4117-BC96-780AA802CE4E",
              "versionEndIncluding": "3.2.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9C8E749B-2908-442A-99F0-91E2772336ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E43D2D7-89AE-4805-9732-F1C601D8D8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3D8911-060D-435D-ACA2-E29271170CAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7A4939-16CF-450D-846A-75B231E32D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C964D4A2-3F39-4CC7-A028-B42C94DDB56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3B54D9FE-0A38-4053-9F3C-8831E2DD2BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "23FD6D82-9A14-4BD4-AA00-1875F0962ACE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature."
    },
    {
      "lang": "es",
      "value": "activerecord/lib/active_record/nested_attributes.rb en Active Record en Ruby on Rails 3.1.x y 3.2.x en versiones anteriores a 3.2.22.1, 4.0.x y 4.1.x en versiones anteriores a 4.1.14.1, 4.2.x en versiones anteriores a 4.2.5.1 y 5.x en versiones anteriores a 5.0.0.beta1.1 no implementa adecuadamente una cierta opci\u00f3n de destruir, lo que permite a atacantes remotos eludir restricciones destinadas al cambio mediante el aprovechamiento del uso de la funcionalidad de atributos anidados."
    }
  ],
  "id": "CVE-2015-7577",
  "lastModified": "2024-11-21T02:37:00.983",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-02-16T02:59:01.063",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3464"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2016/01/25/10"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/81806"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1034816"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/cawsWcQ6c8g/LATIsglZEgAJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2016/01/25/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/81806"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1034816"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/cawsWcQ6c8g/LATIsglZEgAJ"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-06-22 14:55
Modified
2024-11-21 01:39
Severity ?
Summary
The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F046DC2-971A-46E6-A61B-AD39B954D634",
              "versionEndIncluding": "3.0.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661."
    },
    {
      "lang": "es",
      "value": "El componente \u0027Active Record\u0027 en Ruby on Rails antes de la version v3.0.14, v3.1.x antes de v3.1.6 y v3.2.x antes de v3.2.6 no implementa correctamente el paso de los datos de la solicitud a un m\u00e9todo \u0027where\u0027 en la clase ActiveRecord, lo que permite llevar a cabo determinados ataques de inyecci\u00f3n SQL a atacantes remotos a trav\u00e9s de los par\u00e1metros de consulta anidadas que aprovechan una indebida manipulaci\u00f3n de los hashes anidados. Es un problema relacionado con el CVE-2012-2661."
    }
  ],
  "id": "CVE-2012-2695",
  "lastModified": "2024-11-21T01:39:27.853",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-22T14:55:01.147",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-08-29 18:55
Modified
2024-11-21 01:29
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability."
References
secalert@redhat.comhttp://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplainPatch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
secalert@redhat.comhttp://secunia.com/advisories/45917
secalert@redhat.comhttp://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/17/1Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/19/11Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/20/1Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/13Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/14
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/5Patch
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=731435Patch
secalert@redhat.comhttps://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bdPatch
af854a3a-2127-422b-91ae-364da2661108http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplainPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45917
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/17/1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/19/11Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/20/1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/13Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/14
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/5Patch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=731435Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bdPatch



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a \"UTF-8 escaping vulnerability.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias comandos en sitios cruzados (XSS) en activesupport/lib/active_support/core_ext/string/output_safety.rb en Ruby on Rails v2.x antes de v2.3.13, v3.0.x antes de v3.0.10, y v3.1.x antes de v3.1.0.rc5 permite a atacantes remotos ejecutar secuencias de comandos web o HTML a trav\u00e9s de cadenas Unicode malformadas, relacionado con una \"vulnerabilidad de escapado UTF-8\""
    }
  ],
  "id": "CVE-2011-2932",
  "lastModified": "2024-11-21T01:29:18.313",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-08-29T18:55:01.567",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/45917"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731435"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/45917"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-10 10:34
Modified
2024-11-21 01:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup.
Impacted products
Vendor Product Version
rubyonrails rails 0.9.1
rubyonrails rails 0.9.2
rubyonrails rails 0.9.3
rubyonrails rails 0.9.4
rubyonrails rails 0.9.4.1
rubyonrails rails 0.10.0
rubyonrails rails 0.10.1
rubyonrails rails 0.11.0
rubyonrails rails 0.11.1
rubyonrails rails 0.12.0
rubyonrails rails 0.12.1
rubyonrails rails 0.13.0
rubyonrails rails 0.13.1
rubyonrails rails 0.14.1
rubyonrails rails 0.14.2
rubyonrails rails 0.14.3
rubyonrails rails 0.14.4
rubyonrails rails 1.0.0
rubyonrails rails 1.1.0
rubyonrails rails 1.1.1
rubyonrails rails 1.1.2
rubyonrails rails 1.1.3
rubyonrails rails 1.1.4
rubyonrails rails 1.1.5
rubyonrails rails 1.1.6
rubyonrails rails 1.2.0
rubyonrails rails 1.2.1
rubyonrails rails 1.2.2
rubyonrails rails 1.2.3
rubyonrails rails 1.2.4
rubyonrails rails 1.2.5
rubyonrails rails 1.2.6
rubyonrails rails 1.9.5
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.1
rubyonrails rails 2.0.2
rubyonrails rails 2.0.4
rubyonrails rails 2.1.0
rubyonrails rails 2.1.1
rubyonrails rails 2.1.2
rubyonrails rails 2.2.0
rubyonrails rails 2.2.1
rubyonrails rails 2.2.2
rubyonrails rails 2.3.2
rubyonrails rails 2.3.3
rubyonrails rails 2.3.4
rubyonrails rails 2.3.9
rubyonrails rails 2.3.10
rubyonrails rails 2.3.11
rubyonrails rails 2.3.12
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 0.5.0
rubyonrails ruby_on_rails 0.5.5
rubyonrails ruby_on_rails 0.5.6
rubyonrails ruby_on_rails 0.5.7
rubyonrails ruby_on_rails 0.6.0
rubyonrails ruby_on_rails 0.6.5
rubyonrails ruby_on_rails 0.7.0
rubyonrails ruby_on_rails 0.8.0
rubyonrails ruby_on_rails 0.8.5
rubyonrails ruby_on_rails 0.9.0
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB938651-C874-4427-AF9B-E9564B258633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D59FAFB-5D48-4BD8-AD51-FF9A204E373D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE23CCE1-1713-4813-A0AB-1E10DBDA4D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "897109FF-2C37-458A-91A9-7407F3DFBC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "289B1633-AAF7-48BE-9A71-0577428EE531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947FD6D-CD0B-44EE-95B5-E513AF244905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3666B82-1880-4A43-900F-3656F3FB157A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06D18BA-A0AB-461B-B498-2F1759CBF37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBE7E0-C474-43A7-85E3-093C754A253F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7195418-A2E9-43E6-B29F-AEACC317E69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39485B13-3C71-4EC6-97CF-6C796650C5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B30A-65F0-4D63-9A09-B23E9FC8D550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62323F62-AD04-4F43-A566-718DDB4149CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E890B1-4237-4470-939A-4FC489E04520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F3B933-0F68-4F88-999C-0BE48BC88CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E13DAEA-F118-4CB2-88A5-54E3327B6B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33BF68-D887-4C67-8E8C-D2A6CD877FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFCB88D-D946-4510-8DDC-67C32A606589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E793287E-2BDA-4012-86F5-886B82510431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF706143-996C-4120-B620-3EDC977568DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7F32B-C760-4862-B6DB-C38FB2A9182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD68A034-73A2-4B1A-95DB-19AD3131F775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E78C912-E8FF-495F-B922-43C54D1E2180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B72C17-82C3-4930-9227-226C8E64C2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA59F311-B2B4-40EE-A878-64EF9F41581B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "035B47E9-A395-47D2-9164-A2A2CF878326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA55D29-C830-45EF-A3B3-BFA9EED88F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9356A6-D32A-487C-B743-1DA0D6C42FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C7616-8631-49AC-979C-4347067059AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC487B78-AAEA-4F0E-8C8B-F415013A381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BBBE2A-2BDA-4930-8E26-A1E3C6575F81",
              "versionEndIncluding": "3.0.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDC63D-6ED7-48AE-9D72-6419F54D4B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF12B2F-39D9-48D5-9620-DF378D199295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E1EAAF-7B49-498B-BFEB-357173824F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AD626-0AFA-4873-A701-C7716193A69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF69F60A-E8D3-4A4D-BBB5-DE42A1402262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D2B30-FF07-498B-A5E0-A77BAB402619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3141A-162C-4674-BD7B-E1539BAA0B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E73F12-0551-42D2-ACC3-223C98B69C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6BA0659-2287-4E95-B30D-2441CD96DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01A4699-32D3-459E-B731-4240C8157F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup."
    },
    {
      "lang": "es",
      "value": "Cross-site scripting (XSS) en actionpack/lib/action_view/helpers/sanitize_helper.rb en el (helper) strip_tags en Ruby on Rails anterior a v3.0.17, v3.1.x anterior a v3.1.8, y v3.2.x anterio a v3.2.8 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de c\u00f3digo HTML con formato incorrecto."
    }
  ],
  "id": "CVE-2012-3465",
  "lastModified": "2024-11-21T01:40:55.987",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-10T10:34:47.937",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/50694"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-02-13 01:55
Modified
2024-11-21 01:47
Severity ?
Summary
ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html
secalert@redhat.comhttp://secunia.com/advisories/52112
secalert@redhat.comhttp://securitytracker.com/id?1028109
secalert@redhat.comhttp://support.apple.com/kb/HT5784
secalert@redhat.comhttp://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2620
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2013/02/11/6Patch
secalert@redhat.comhttp://www.osvdb.org/90073
secalert@redhat.comhttps://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source&output=gplain
secalert@redhat.comhttps://puppet.com/security/cve/cve-2013-0277
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/52112
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1028109
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5784
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2620
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2013/02/11/6Patch
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/90073
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source&output=gplain
af854a3a-2127-422b-91ae-364da2661108https://puppet.com/security/cve/cve-2013-0277



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CEB24FC-F068-4EBD-BDC8-AB5BC56130DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DF384-3992-43BF-8A5C-65FA53E9A77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7453BE5-91C8-42B2-9F75-FFE4038F29A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2FD44EB-E899-4FA8-985E-44B75134DDC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E13E309-2411-4E1D-B27F-BF5DDDD5D5C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E1C795F-CCAC-47AC-B809-BD5510310011",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML."
    },
    {
      "lang": "es",
      "value": "Active Record en Ruby on Rails v3.x anteriores a v3.1.0 y v2.3.x anteriores a v2.3.17 permite a atacantes remotos causar una denegaci\u00f3n de servicio o ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de atributos serializados manipulados que causan al asistente +serialize+ la des-serializaci\u00f3n arbitraria del YAML.\r\n\r\n"
    }
  ],
  "id": "CVE-2013-0277",
  "lastModified": "2024-11-21T01:47:13.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-13T01:55:05.230",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/52112"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1028109"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2013/dsa-2620"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/02/11/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/90073"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://puppet.com/security/cve/cve-2013-0277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/52112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1028109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2620"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/02/11/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/90073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://puppet.com/security/cve/cve-2013-0277"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-13 10:55
Modified
2024-11-21 01:36
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Ruby on Rails 3.0.x anteriores a 3.0.12, 3.1.x anteriores a 3.1.4, y 3.2.x anterioes a 3.2.2 permite a atacantes remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s de vectores que involucran un objeto SafeBuffer que es manipulado a trav\u00e9s de determinados m\u00e9todos."
    }
  ],
  "id": "CVE-2012-1098",
  "lastModified": "2024-11-21T01:36:24.913",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-03-13T10:55:01.213",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799275"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799275"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-07-26 22:59
Modified
2024-11-21 02:28
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "75842F7D-B1B1-48BA-858F-01148867B3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0406FF0-30F5-40E2-B9B8-FE465D923DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F51980-EAD9-4E4D-A2E7-1FACFA80AAB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC02A7D1-CB1A-4793-86E3-CF88D0BCDF83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B7A927B-7E18-44B5-9307-E602790F8AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8D57F-9849-428C-B8E9-D0A1020728BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0359DA8-6B41-46C5-AA95-41B1B366DD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "847B3C3D-8656-404D-A954-09C159EDC8E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CA2D50-B33C-4088-BDDF-EB964C9A092C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CADB5989-5260-4F60-ACF2-BEB6D7F97654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9036E3C7-0AD5-489D-BCEE-31DFE13F5ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "539C550D-FEDD-415E-95AE-40E1AE2BAF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C5B869-74FC-4051-A103-A721332B3CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A68D41F-36A9-4B77-814D-996F4E48FA79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F1142C-3BFB-4B72-A033-81E20DB19D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A325F57E-0055-4279-9ED7-A26E75FC38E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad XSS en json/encoding.rb en Active Support en Ruby on Rails en las versiones 3.x, 4.1.x anterior a 4.1.11 y 4.2 anterior a 4.2.2, permite a atacantes remotos inyectar c\u00f3digo arbitrario HTML o web script a trav\u00e9s de un Hash manipulado que no es manejado correctamente durante la codificaci\u00f3n JSON."
    }
  ],
  "id": "CVE-2015-3226",
  "lastModified": "2024-11-21T02:28:56.833",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2015-07-26T22:59:05.133",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2015/06/16/17"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3464"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/75231"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1033755"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2015/06/16/17"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/75231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1033755"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-11-18 23:59
Modified
2024-11-21 02:18
Severity ?
Summary
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.
Impacted products
Vendor Product Version
opensuse opensuse 12.3
opensuse opensuse 13.1
opensuse opensuse 13.2
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.15
rubyonrails rails 3.2.16
rubyonrails rails 3.2.17
rubyonrails rails 3.2.18
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.2
rubyonrails rails 4.0.3
rubyonrails rails 4.0.4
rubyonrails rails 4.0.5
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.7
rubyonrails rails 4.0.8
rubyonrails rails 4.0.9
rubyonrails rails 4.0.10
rubyonrails rails 4.0.10
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.1
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.3
rubyonrails rails 4.1.4
rubyonrails rails 4.1.5
rubyonrails rails 4.1.6
rubyonrails rails 4.1.6
rubyonrails rails 4.1.7
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails ruby_on_rails 3.0.4
rubyonrails ruby_on_rails 3.2.19
rubyonrails ruby_on_rails 3.2.20
rubyonrails ruby_on_rails 4.0.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE65D701-AA6E-48E4-B62B-C22DEE863503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17B1E475-C873-4561-9348-027721C08D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.15:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6646610D-279B-4AEC-B445-981E7784EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F51980-EAD9-4E4D-A2E7-1FACFA80AAB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC02A7D1-CB1A-4793-86E3-CF88D0BCDF83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A499584B-6E2E-42F3-B0CE-DA7BDD732897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "254884EE-EBA4-45D0-9704-B5CB22569668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C913A56-959D-44F1-BD89-D246C66D1F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5D5BA926-38EE-47BE-9D16-FDCF360A503B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "18EA25F1-279A-4F1A-883D-C064369F592E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD794856-6F30-4ABF-8AE4-720BB75E6F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4199B8B-A6F9-4BFD-8D27-0E663D8C579D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11E76A3-FA5B-4038-AB52-3D7D5E54D8A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "767C481D-6616-4CA9-9A9B-C994D9121796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5496953-0C5E-45F8-A7FB-240CEC2CCEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CA46B621-125E-497F-B2DE-91C989B25936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B3239443-2E19-4540-BA0C-05A27E44CB6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "104AC9CF-6611-4469-9852-7FDAF4EC7638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC9E1864-B1E5-42C3-B4AF-9A002916B66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AC91AA-6A9A-43B4-B3E9-A66A34B6E612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A462C151-982E-4A83-A376-025015F40645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "660C2AD2-CEC8-4391-84AF-27515A88B29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "578CC013-776B-4868-B448-B7ACAF3AF832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C310EA3E-399A-48FD-8DE9-6950E328CF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "293B2998-5169-4960-BEC4-21DAC837E32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8D57F-9849-428C-B8E9-D0A1020728BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0359DA8-6B41-46C5-AA95-41B1B366DD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0965BDB6-9644-465C-AA32-9278B2D53197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B15CF-37C1-4C9B-8457-4A8C9A480188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "072EB16D-1325-4869-B156-65E786A834C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "847B3C3D-8656-404D-A954-09C159EDC8E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CA2D50-B33C-4088-BDDF-EB964C9A092C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CADB5989-5260-4F60-ACF2-BEB6D7F97654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9036E3C7-0AD5-489D-BCEE-31DFE13F5ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "509597D0-22E1-4BE8-95AD-C54FE4D15FA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "539C550D-FEDD-415E-95AE-40E1AE2BAF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "709A19A5-8FD1-4F9C-A38C-F06242A94D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8104482C-E8F5-40A7-8B27-234FEF725FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF8677-EA00-4F7E-BFF9-272482206DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "69702127-AB96-4FE0-9AC4-FBE7B8CA77E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "48D71F7B-CF93-41D4-A824-51CB11F08692",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E43D2D7-89AE-4805-9732-F1C601D8D8B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \\ (backslash) character, a similar issue to CVE-2014-7818."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de salto de directorio en actionpack/lib/action_dispatch/middleware/static.rb en el Action Pack de Ruby on Rails 3.x anterior a 3.2.21, 4.0.x anterior a 4.0.12, 4.1.x anterior a 4.1.8, y 4.2.x anterior a 4.2.0.beta4, cuando serve_static_assets est\u00e1 activado, permite a atacantes remotos determinar la existencia de ficheros fuera de la aplicaci\u00f3n root a trav\u00e9s de vectores que implican un car\u00e1cter \\ (barra invertida), un problema similar al CVE-2014-7818."
    }
  ],
  "id": "CVE-2014-7829",
  "lastModified": "2024-11-21T02:18:05.687",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-11-18T23:59:03.427",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/71183"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://puppet.com/security/cve/cve-2014-7829"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/71183"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://puppet.com/security/cve/cve-2014-7829"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-12-07 17:30
Modified
2024-11-21 01:09
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb.
References
cve@mitre.orghttp://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5Patch
cve@mitre.orghttp://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
cve@mitre.orghttp://secunia.com/advisories/37446Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/38915Vendor Advisory
cve@mitre.orghttp://support.apple.com/kb/HT4077
cve@mitre.orghttp://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2260
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2301
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2009/11/27/2
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2009/12/08/3
cve@mitre.orghttp://www.securityfocus.com/bid/37142Patch
cve@mitre.orghttp://www.securitytracker.com/id?1023245
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/3352Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5Patch
af854a3a-2127-422b-91ae-364da2661108http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37446Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38915Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2260
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2301
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/27/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/12/08/3
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/37142Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1023245
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3352Patch, Vendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB938651-C874-4427-AF9B-E9564B258633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D59FAFB-5D48-4BD8-AD51-FF9A204E373D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE23CCE1-1713-4813-A0AB-1E10DBDA4D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "897109FF-2C37-458A-91A9-7407F3DFBC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "289B1633-AAF7-48BE-9A71-0577428EE531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947FD6D-CD0B-44EE-95B5-E513AF244905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3666B82-1880-4A43-900F-3656F3FB157A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06D18BA-A0AB-461B-B498-2F1759CBF37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBE7E0-C474-43A7-85E3-093C754A253F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7195418-A2E9-43E6-B29F-AEACC317E69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39485B13-3C71-4EC6-97CF-6C796650C5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B30A-65F0-4D63-9A09-B23E9FC8D550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62323F62-AD04-4F43-A566-718DDB4149CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E890B1-4237-4470-939A-4FC489E04520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F3B933-0F68-4F88-999C-0BE48BC88CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E13DAEA-F118-4CB2-88A5-54E3327B6B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33BF68-D887-4C67-8E8C-D2A6CD877FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFCB88D-D946-4510-8DDC-67C32A606589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E793287E-2BDA-4012-86F5-886B82510431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF706143-996C-4120-B620-3EDC977568DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7F32B-C760-4862-B6DB-C38FB2A9182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD68A034-73A2-4B1A-95DB-19AD3131F775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E78C912-E8FF-495F-B922-43C54D1E2180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B72C17-82C3-4930-9227-226C8E64C2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA59F311-B2B4-40EE-A878-64EF9F41581B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "035B47E9-A395-47D2-9164-A2A2CF878326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA55D29-C830-45EF-A3B3-BFA9EED88F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9356A6-D32A-487C-B743-1DA0D6C42FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C7616-8631-49AC-979C-4347067059AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC487B78-AAEA-4F0E-8C8B-F415013A381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "195F4692-EB88-40A4-AEF5-0F81CC41CFE3",
              "versionEndIncluding": "2.1.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDC63D-6ED7-48AE-9D72-6419F54D4B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF12B2F-39D9-48D5-9620-DF378D199295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E1EAAF-7B49-498B-BFEB-357173824F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AD626-0AFA-4873-A701-C7716193A69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF69F60A-E8D3-4A4D-BBB5-DE42A1402262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D2B30-FF07-498B-A5E0-A77BAB402619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3141A-162C-4674-BD7B-E1539BAA0B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E73F12-0551-42D2-ACC3-223C98B69C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6BA0659-2287-4E95-B30D-2441CD96DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01A4699-32D3-459E-B731-4240C8157F71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Ruby on Rails anterior v2.2.s, y v2.3.x anterior v2.3.5, permite a atacantes remotos inyectar c\u00f3digo Web o HTML a su lecci\u00f3n a trav\u00e9s de vectores que incluyen caracteres ASCII no imprimibles, relacionado con HTML::Tokenizer y actionpack/lib/action_controller/vendor/html-scanner/html/node.rb."
    }
  ],
  "id": "CVE-2009-4214",
  "lastModified": "2024-11-21T01:09:10.180",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-12-07T17:30:00.217",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37446"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38915"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2260"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2301"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/27/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2009/12/08/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/37142"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1023245"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3352"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37446"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38915"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2260"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/27/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/12/08/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/37142"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1023245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3352"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-11-28 11:55
Modified
2024-11-21 01:32
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an "html" substring.
References
secalert@redhat.comhttp://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1
secalert@redhat.comhttp://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source&output=gplain
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/11/18/8
secalert@redhat.comhttp://osvdb.org/77199
secalert@redhat.comhttp://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released
secalert@redhat.comhttp://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released
secalert@redhat.comhttp://www.securityfocus.com/bid/50722
secalert@redhat.comhttp://www.securitytracker.com/id?1026342
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/71364
af854a3a-2127-422b-91ae-364da2661108http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1
af854a3a-2127-422b-91ae-364da2661108http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source&output=gplain
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/11/18/8
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/77199
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/50722
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1026342
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/71364
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 2.3.2
rubyonrails rails 2.3.3
rubyonrails rails 2.3.4
rubyonrails rails 2.3.9
rubyonrails rails 2.3.10
rubyonrails rails 2.3.11
rubyonrails rails 2.3.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an \"html\" substring."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados en el m\u00e9todo de ayuda de las traducciones i18n en Ruby on Rails v3.0.x antes de v3.0.11 y v3.1.x antes de v3.1.2 y el complemento rails_xss en Ruby on Rails v2.3.x, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores relacionados con una cadena de traducciones cuyo nombre termina con la subcadena \"html\"."
    }
  ],
  "id": "CVE-2011-4319",
  "lastModified": "2024-11-21T01:32:13.767",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-11-28T11:55:09.127",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/11/18/8"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/77199"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/50722"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1026342"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71364"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/11/18/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/77199"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/50722"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026342"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71364"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-03-19 22:55
Modified
2024-11-21 01:50
Severity ?
Summary
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0698.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1863.html
secalert@redhat.comhttp://support.apple.com/kb/HT5784
secalert@redhat.comhttp://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
secalert@redhat.comhttps://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0698.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1863.html
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5784
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain
Impacted products
Vendor Product Version
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 0.9.1
rubyonrails rails 0.9.2
rubyonrails rails 0.9.3
rubyonrails rails 0.9.4
rubyonrails rails 0.9.4.1
rubyonrails rails 0.10.0
rubyonrails rails 0.10.1
rubyonrails rails 0.11.0
rubyonrails rails 0.11.1
rubyonrails rails 0.12.0
rubyonrails rails 0.12.1
rubyonrails rails 0.13.0
rubyonrails rails 0.13.1
rubyonrails rails 0.14.1
rubyonrails rails 0.14.2
rubyonrails rails 0.14.3
rubyonrails rails 0.14.4
rubyonrails rails 1.0.0
rubyonrails rails 1.1.0
rubyonrails rails 1.1.1
rubyonrails rails 1.1.2
rubyonrails rails 1.1.3
rubyonrails rails 1.1.4
rubyonrails rails 1.1.5
rubyonrails rails 1.1.6
rubyonrails rails 1.2.0
rubyonrails rails 1.2.1
rubyonrails rails 1.2.2
rubyonrails rails 1.2.3
rubyonrails rails 1.2.4
rubyonrails rails 1.2.5
rubyonrails rails 1.2.6
rubyonrails rails 1.9.5
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.1
rubyonrails rails 2.0.2
rubyonrails rails 2.0.4
rubyonrails rails 2.1.0
rubyonrails rails 2.1.1
rubyonrails rails 2.1.2
rubyonrails rails 2.2.0
rubyonrails rails 2.2.1
rubyonrails rails 2.2.2
rubyonrails rails 2.3.0
rubyonrails rails 2.3.1
rubyonrails rails 2.3.2
rubyonrails rails 2.3.3
rubyonrails rails 2.3.4
rubyonrails rails 2.3.9
rubyonrails rails 2.3.10
rubyonrails rails 2.3.11
rubyonrails rails 2.3.12
rubyonrails rails 2.3.13
rubyonrails rails 2.3.14
rubyonrails rails 2.3.15
rubyonrails rails 2.3.16
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 0.5.0
rubyonrails ruby_on_rails 0.5.5
rubyonrails ruby_on_rails 0.5.6
rubyonrails ruby_on_rails 0.5.7
rubyonrails ruby_on_rails 0.6.0
rubyonrails ruby_on_rails 0.6.5
rubyonrails ruby_on_rails 0.7.0
rubyonrails ruby_on_rails 0.8.0
rubyonrails ruby_on_rails 0.8.5
rubyonrails ruby_on_rails 0.9.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails ruby_on_rails 3.1.11
redhat enterprise_linux 6.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB938651-C874-4427-AF9B-E9564B258633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D59FAFB-5D48-4BD8-AD51-FF9A204E373D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE23CCE1-1713-4813-A0AB-1E10DBDA4D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "897109FF-2C37-458A-91A9-7407F3DFBC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "289B1633-AAF7-48BE-9A71-0577428EE531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947FD6D-CD0B-44EE-95B5-E513AF244905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3666B82-1880-4A43-900F-3656F3FB157A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06D18BA-A0AB-461B-B498-2F1759CBF37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBE7E0-C474-43A7-85E3-093C754A253F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7195418-A2E9-43E6-B29F-AEACC317E69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39485B13-3C71-4EC6-97CF-6C796650C5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B30A-65F0-4D63-9A09-B23E9FC8D550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62323F62-AD04-4F43-A566-718DDB4149CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E890B1-4237-4470-939A-4FC489E04520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F3B933-0F68-4F88-999C-0BE48BC88CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E13DAEA-F118-4CB2-88A5-54E3327B6B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33BF68-D887-4C67-8E8C-D2A6CD877FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFCB88D-D946-4510-8DDC-67C32A606589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E793287E-2BDA-4012-86F5-886B82510431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF706143-996C-4120-B620-3EDC977568DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7F32B-C760-4862-B6DB-C38FB2A9182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD68A034-73A2-4B1A-95DB-19AD3131F775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E78C912-E8FF-495F-B922-43C54D1E2180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B72C17-82C3-4930-9227-226C8E64C2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA59F311-B2B4-40EE-A878-64EF9F41581B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "035B47E9-A395-47D2-9164-A2A2CF878326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA55D29-C830-45EF-A3B3-BFA9EED88F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9356A6-D32A-487C-B743-1DA0D6C42FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C7616-8631-49AC-979C-4347067059AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC487B78-AAEA-4F0E-8C8B-F415013A381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CEB24FC-F068-4EBD-BDC8-AB5BC56130DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DF384-3992-43BF-8A5C-65FA53E9A77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7453BE5-91C8-42B2-9F75-FFE4038F29A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2FD44EB-E899-4FA8-985E-44B75134DDC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E13E309-2411-4E1D-B27F-BF5DDDD5D5C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E1C795F-CCAC-47AC-B809-BD5510310011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C230384C-A52A-4167-A07D-0E06138EE246",
              "versionEndIncluding": "2.3.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDC63D-6ED7-48AE-9D72-6419F54D4B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF12B2F-39D9-48D5-9620-DF378D199295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E1EAAF-7B49-498B-BFEB-357173824F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AD626-0AFA-4873-A701-C7716193A69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF69F60A-E8D3-4A4D-BBB5-DE42A1402262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D2B30-FF07-498B-A5E0-A77BAB402619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3141A-162C-4674-BD7B-E1539BAA0B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E73F12-0551-42D2-ACC3-223C98B69C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6BA0659-2287-4E95-B30D-2441CD96DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01A4699-32D3-459E-B731-4240C8157F71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F0635C-4EBF-4EA3-9756-A85A3BB5026B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences."
    },
    {
      "lang": "es",
      "value": "El m\u00e9todo sanitize_css en lib/action_controller/vendor/html-scanner/html/sanitizer.rb en el componente Action Pack en Ruby on Rails anterior a v2.3.18, v3.0.x y v3.1.x anterior a v3.1.12, y v3.2.x anterior a v3.2.13, no menaja adecuadamente los caracteres \\n (nueva l\u00ednea), lo que facilita a atacantes remotos llevar a cabo ataques XSS a trav\u00e9s de secuencias CSS."
    }
  ],
  "id": "CVE-2013-1855",
  "lastModified": "2024-11-21T01:50:31.663",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-03-19T22:55:01.027",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-11-08 11:55
Modified
2024-11-21 02:18
Severity ?
Summary
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.15
rubyonrails rails 3.2.16
rubyonrails rails 3.2.17
rubyonrails rails 3.2.18
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.2
rubyonrails rails 4.0.3
rubyonrails rails 4.0.4
rubyonrails rails 4.0.5
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.7
rubyonrails rails 4.0.8
rubyonrails rails 4.0.9
rubyonrails rails 4.0.10
rubyonrails rails 4.0.10
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.1
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.3
rubyonrails rails 4.1.4
rubyonrails rails 4.1.5
rubyonrails rails 4.1.6
rubyonrails rails 4.1.6
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails ruby_on_rails 3.0.4
rubyonrails ruby_on_rails 3.2.19
opensuse opensuse 12.3
opensuse opensuse 13.1
opensuse opensuse 13.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE65D701-AA6E-48E4-B62B-C22DEE863503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17B1E475-C873-4561-9348-027721C08D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.15:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6646610D-279B-4AEC-B445-981E7784EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F51980-EAD9-4E4D-A2E7-1FACFA80AAB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC02A7D1-CB1A-4793-86E3-CF88D0BCDF83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A499584B-6E2E-42F3-B0CE-DA7BDD732897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "254884EE-EBA4-45D0-9704-B5CB22569668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C913A56-959D-44F1-BD89-D246C66D1F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5D5BA926-38EE-47BE-9D16-FDCF360A503B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "18EA25F1-279A-4F1A-883D-C064369F592E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD794856-6F30-4ABF-8AE4-720BB75E6F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4199B8B-A6F9-4BFD-8D27-0E663D8C579D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11E76A3-FA5B-4038-AB52-3D7D5E54D8A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "767C481D-6616-4CA9-9A9B-C994D9121796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5496953-0C5E-45F8-A7FB-240CEC2CCEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CA46B621-125E-497F-B2DE-91C989B25936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B3239443-2E19-4540-BA0C-05A27E44CB6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "104AC9CF-6611-4469-9852-7FDAF4EC7638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC9E1864-B1E5-42C3-B4AF-9A002916B66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AC91AA-6A9A-43B4-B3E9-A66A34B6E612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A462C151-982E-4A83-A376-025015F40645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "660C2AD2-CEC8-4391-84AF-27515A88B29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "578CC013-776B-4868-B448-B7ACAF3AF832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C310EA3E-399A-48FD-8DE9-6950E328CF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "293B2998-5169-4960-BEC4-21DAC837E32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8D57F-9849-428C-B8E9-D0A1020728BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0359DA8-6B41-46C5-AA95-41B1B366DD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0965BDB6-9644-465C-AA32-9278B2D53197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B15CF-37C1-4C9B-8457-4A8C9A480188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "072EB16D-1325-4869-B156-65E786A834C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "847B3C3D-8656-404D-A954-09C159EDC8E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CA2D50-B33C-4088-BDDF-EB964C9A092C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CADB5989-5260-4F60-ACF2-BEB6D7F97654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9036E3C7-0AD5-489D-BCEE-31DFE13F5ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "509597D0-22E1-4BE8-95AD-C54FE4D15FA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "709A19A5-8FD1-4F9C-A38C-F06242A94D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8104482C-E8F5-40A7-8B27-234FEF725FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "69702127-AB96-4FE0-9AC4-FBE7B8CA77E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en actionpack/lib/action_dispatch/middleware/static.rb en Action Pack en Ruby on Rails 3.x anterior a 3.2.20, 4.0.x anterior a 4.0.11, 4.1.x anterior a 4.1.7, y 4.2.x anterior a 4.2.0.beta3, cuando serve_static_assets est\u00e1 habilitado, permite a atacantes remotos determinar la existencia de ficheros fuera del root de la aplicaci\u00f3n a trav\u00e9s de una secuencia /..%2F."
    }
  ],
  "id": "CVE-2014-7818",
  "lastModified": "2024-11-21T02:18:04.337",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-11-08T11:55:02.977",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://puppet.com/security/cve/cve-2014-7829"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://puppet.com/security/cve/cve-2014-7829"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-08 10:26
Modified
2024-11-21 01:40
Severity ?
Summary
The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a with_http_digest helper method, as demonstrated by the authenticate_or_request_with_http_digest method.
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a with_http_digest helper method, as demonstrated by the authenticate_or_request_with_http_digest method."
    },
    {
      "lang": "es",
      "value": "El m\u00e9todo decode_credentials method en actionpack/lib/action_controller/metal/http_authentication.rb en Ruby on Rails 3.x anterior a 3.0.16, 3.1.x anterior a 3.1.7, y 3.2.x anterior a 3.2.7 convierte las cadenas Digest Authentication a s\u00edmbolos, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio aprovechando el acceso a una aplicaci\u00f3n que se utiliza un m\u00e9todo de ayuda with_http_digest, como se demostr\u00f3 con el m\u00e9todo authenticate_or_request_with_http_digest."
    }
  ],
  "id": "CVE-2012-3424",
  "lastModified": "2024-11-21T01:40:50.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-08T10:26:19.063",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en\u0026dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en\u0026dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-11-21 12:00
Modified
2024-11-21 00:53
Severity ?
Summary
CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB938651-C874-4427-AF9B-E9564B258633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D59FAFB-5D48-4BD8-AD51-FF9A204E373D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE23CCE1-1713-4813-A0AB-1E10DBDA4D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "897109FF-2C37-458A-91A9-7407F3DFBC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "289B1633-AAF7-48BE-9A71-0577428EE531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947FD6D-CD0B-44EE-95B5-E513AF244905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3666B82-1880-4A43-900F-3656F3FB157A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06D18BA-A0AB-461B-B498-2F1759CBF37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBE7E0-C474-43A7-85E3-093C754A253F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7195418-A2E9-43E6-B29F-AEACC317E69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39485B13-3C71-4EC6-97CF-6C796650C5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B30A-65F0-4D63-9A09-B23E9FC8D550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62323F62-AD04-4F43-A566-718DDB4149CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E890B1-4237-4470-939A-4FC489E04520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F3B933-0F68-4F88-999C-0BE48BC88CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E13DAEA-F118-4CB2-88A5-54E3327B6B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33BF68-D887-4C67-8E8C-D2A6CD877FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFCB88D-D946-4510-8DDC-67C32A606589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E793287E-2BDA-4012-86F5-886B82510431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF706143-996C-4120-B620-3EDC977568DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7F32B-C760-4862-B6DB-C38FB2A9182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD68A034-73A2-4B1A-95DB-19AD3131F775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E78C912-E8FF-495F-B922-43C54D1E2180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B72C17-82C3-4930-9227-226C8E64C2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA59F311-B2B4-40EE-A878-64EF9F41581B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "035B47E9-A395-47D2-9164-A2A2CF878326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA55D29-C830-45EF-A3B3-BFA9EED88F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9356A6-D32A-487C-B743-1DA0D6C42FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C7616-8631-49AC-979C-4347067059AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC487B78-AAEA-4F0E-8C8B-F415013A381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA2DB681-506C-40ED-9259-AFD733F6273A",
              "versionEndIncluding": "2.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDC63D-6ED7-48AE-9D72-6419F54D4B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF12B2F-39D9-48D5-9620-DF378D199295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E1EAAF-7B49-498B-BFEB-357173824F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AD626-0AFA-4873-A701-C7716193A69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF69F60A-E8D3-4A4D-BBB5-DE42A1402262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D2B30-FF07-498B-A5E0-A77BAB402619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3141A-162C-4674-BD7B-E1539BAA0B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E73F12-0551-42D2-ACC3-223C98B69C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6BA0659-2287-4E95-B30D-2441CD96DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01A4699-32D3-459E-B731-4240C8157F71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n CRLF en Ruby on Rails anteriores a v2.0.5, permite a atacantes remotos inyectar cabeceras HTTP de su elecci\u00f3n y llevar a cabo ataques de divisi\u00f3n de respuesta HTTP  mediante una URL manipulada a la funci\u00f3n redirect_to."
    }
  ],
  "id": "CVE-2008-5189",
  "lastModified": "2024-11-21T00:53:30.897",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-11-21T12:00:00.187",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/32359"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/32359"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-02-16 02:59
Modified
2024-11-21 02:42
Summary
actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0296.html
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3464
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2016/01/25/9
secalert@redhat.comhttp://www.securityfocus.com/bid/81800
secalert@redhat.comhttp://www.securitytracker.com/id/1034816
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0296.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3464
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2016/01/25/9
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/81800
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1034816
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ
Impacted products
Vendor Product Version
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.2
rubyonrails rails 4.0.3
rubyonrails rails 4.0.4
rubyonrails rails 4.0.5
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.7
rubyonrails rails 4.0.8
rubyonrails rails 4.0.9
rubyonrails rails 4.0.10
rubyonrails rails 4.0.10
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.1
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.3
rubyonrails rails 4.1.4
rubyonrails rails 4.1.5
rubyonrails rails 4.1.6
rubyonrails rails 4.1.7
rubyonrails rails 4.1.8
rubyonrails rails 4.1.9
rubyonrails rails 4.1.10
rubyonrails rails 4.1.12
rubyonrails rails 4.1.13
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.2
rubyonrails rails 4.2.3
rubyonrails rails 4.2.3
rubyonrails rails 4.2.4
rubyonrails rails 4.2.4
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5
rubyonrails rails 5.0.0
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 4.0.10
rubyonrails ruby_on_rails 4.0.11
rubyonrails ruby_on_rails 4.0.11.1
rubyonrails ruby_on_rails 4.0.12
rubyonrails ruby_on_rails 4.0.13
rubyonrails ruby_on_rails 4.0.13
rubyonrails ruby_on_rails 4.1.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "254884EE-EBA4-45D0-9704-B5CB22569668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C913A56-959D-44F1-BD89-D246C66D1F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5D5BA926-38EE-47BE-9D16-FDCF360A503B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "18EA25F1-279A-4F1A-883D-C064369F592E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD794856-6F30-4ABF-8AE4-720BB75E6F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4199B8B-A6F9-4BFD-8D27-0E663D8C579D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11E76A3-FA5B-4038-AB52-3D7D5E54D8A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "767C481D-6616-4CA9-9A9B-C994D9121796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5496953-0C5E-45F8-A7FB-240CEC2CCEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CA46B621-125E-497F-B2DE-91C989B25936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B3239443-2E19-4540-BA0C-05A27E44CB6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "104AC9CF-6611-4469-9852-7FDAF4EC7638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC9E1864-B1E5-42C3-B4AF-9A002916B66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AC91AA-6A9A-43B4-B3E9-A66A34B6E612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A462C151-982E-4A83-A376-025015F40645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "660C2AD2-CEC8-4391-84AF-27515A88B29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "578CC013-776B-4868-B448-B7ACAF3AF832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C310EA3E-399A-48FD-8DE9-6950E328CF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "293B2998-5169-4960-BEC4-21DAC837E32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8D57F-9849-428C-B8E9-D0A1020728BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0359DA8-6B41-46C5-AA95-41B1B366DD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0965BDB6-9644-465C-AA32-9278B2D53197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B15CF-37C1-4C9B-8457-4A8C9A480188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "072EB16D-1325-4869-B156-65E786A834C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "847B3C3D-8656-404D-A954-09C159EDC8E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CA2D50-B33C-4088-BDDF-EB964C9A092C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CADB5989-5260-4F60-ACF2-BEB6D7F97654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "509597D0-22E1-4BE8-95AD-C54FE4D15FA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "539C550D-FEDD-415E-95AE-40E1AE2BAF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C5B869-74FC-4051-A103-A721332B3CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C31EBD2-CD2D-4D38-AA51-A5A56487939A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FBD4E4-0BCD-49E1-BA84-86621B7C4556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D1EB17-EE67-48E5-B637-AA9A75D397F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2B1711A-5541-412C-A5A0-274CEAB9E387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "709A19A5-8FD1-4F9C-A38C-F06242A94D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8104482C-E8F5-40A7-8B27-234FEF725FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF8677-EA00-4F7E-BFF9-272482206DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8D7DF5CD-DA28-492D-B5EE-D252ECCC8D96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "85435026-9855-4BF4-A436-832628B005FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56C2308F-A590-47B0-9791-7865D189196F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9A266882-DABA-4A4C-88E6-60E993EE0947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F1142C-3BFB-4B72-A033-81E20DB19D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1FA738A1-227B-4665-B65E-666883FFAE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6F00718C-A9E8-4E85-8DA6-33BF11F2DCCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "10789A2D-6401-4119-BFBE-2EE4C16216D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "70ABD462-7142-4831-8EB6-801EC1D05573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D717DB-7C80-48AA-A774-E291D2E75D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "06B357FB-0307-4EFA-9C5B-3C2CDEA48584",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E4BD8840-0F1C-49D3-B843-9CFE64948018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D5B492-43F9-470F-BD21-6EFD93E78453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4EC1F602-D48C-458A-A063-4050BE3BB25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A1C015-56AD-489C-B301-68CF1DBF1BEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD191625-ACE2-46B6-9AAD-12D682C732C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "02C7DB56-267B-4057-A9BA-36D1E58C6282",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "AF8F94CF-D504-4165-A69E-3F1198CB162A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C068362-0D49-4117-BC96-780AA802CE4E",
              "versionEndIncluding": "3.2.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9C8E749B-2908-442A-99F0-91E2772336ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E43D2D7-89AE-4805-9732-F1C601D8D8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3D8911-060D-435D-ACA2-E29271170CAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7A4939-16CF-450D-846A-75B231E32D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C964D4A2-3F39-4CC7-A028-B42C94DDB56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3B54D9FE-0A38-4053-9F3C-8831E2DD2BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "23FD6D82-9A14-4BD4-AA00-1875F0962ACE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header."
    },
    {
      "lang": "es",
      "value": "actionpack/lib/action_dispatch/http/mime_type.rb en Action Pack en Ruby on Rails en versiones anteriores a 3.2.22.1, 4.0.x y 4.1.x en versiones anteriores a 4.1.14.1, 4.2.x en versiones anteriores a 4.2.5.1 y 5.x en versiones anteriores a 5.0.0.beta1.1 no restringe adecuadamente el uso de la cach\u00e9 de tipo MIME, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de una cabecera HTTP Accept manipulada."
    }
  ],
  "id": "CVE-2016-0751",
  "lastModified": "2024-11-21T02:42:18.350",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-02-16T02:59:05.877",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3464"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2016/01/25/9"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/81800"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1034816"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2016/01/25/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/81800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1034816"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-08-29 18:55
Modified
2024-11-21 01:29
Severity ?
Summary
The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."
References
secalert@redhat.comhttp://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplainPatch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
secalert@redhat.comhttp://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/17/1Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/19/11Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/20/1Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/13Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/14
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/5Patch
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=731432Patch
secalert@redhat.comhttps://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552Patch
af854a3a-2127-422b-91ae-364da2661108http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplainPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/17/1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/19/11Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/20/1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/13Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/14
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/5Patch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=731432Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552Patch



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a \"filter skipping vulnerability.\""
    },
    {
      "lang": "es",
      "value": "La funcionalidad de selecci\u00f3n de plantilla en actionpack/lib/action_view/template/resolver.rb en Ruby sobre Rails 3.0.x anterior a v3.0.10 y v3.1.x anterior a v3.1.0.rc6 no maneja adecuadamente caracteres glob, lo que permite a atacantes remotos renderizar vistas de su elecci\u00f3n a trav\u00e9s de una URL manipulada, relacionada con una vulnerabilidad \"filter skipping\"."
    }
  ],
  "id": "CVE-2011-2929",
  "lastModified": "2024-11-21T01:29:17.813",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-08-29T18:55:01.393",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731432"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-20 15:27
Modified
2024-11-21 02:01
Severity ?
Summary
actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html
secalert@redhat.comhttp://openwall.com/lists/oss-security/2014/02/18/10
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0215.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0306.html
secalert@redhat.comhttp://secunia.com/advisories/57376
secalert@redhat.comhttp://secunia.com/advisories/57836
secalert@redhat.comhttp://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ
secalert@redhat.comhttps://puppet.com/security/cve/cve-2014-0082
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2014/02/18/10
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0215.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0306.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/57376
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/57836
af854a3a-2127-422b-91ae-364da2661108http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ
af854a3a-2127-422b-91ae-364da2661108https://puppet.com/security/cve/cve-2014-0082
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.15
rubyonrails rails 3.2.15
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 3.0.4
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.15
rubyonrails ruby_on_rails 3.2.15



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "75842F7D-B1B1-48BA-858F-01148867B3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE65D701-AA6E-48E4-B62B-C22DEE863503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17B1E475-C873-4561-9348-027721C08D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0406FF0-30F5-40E2-B9B8-FE465D923DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.15:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6646610D-279B-4AEC-B445-981E7784EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "005A14B0-1621-4A0C-A990-2B8B59C199B3",
              "versionEndIncluding": "3.2.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A325F57E-0055-4279-9ED7-A26E75FC38E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9A3BA4AE-B4F0-4204-AFA1-1016F0A6F7AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "991F368C-CEB5-4DE6-A7EE-C341F358A4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01DB164E-E08E-4649-84BD-15B4159A3AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E0F7ECFB-86A1-4F00-AD47-971FA23C6D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers."
    },
    {
      "lang": "es",
      "value": "actionpack/lib/action_view/template/text.rb en Action View en Ruby on Rails 3.x anterior a 3.2.17 convierte cadenas tipo MIME a s\u00edmbolos durante el uso de la opci\u00f3n :text al m\u00e9todo render, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) mediante la inclusi\u00f3n de estas cadenas en cabeceras."
    }
  ],
  "id": "CVE-2014-0082",
  "lastModified": "2024-11-21T02:01:19.423",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-20T15:27:09.170",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2014/02/18/10"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/57376"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/57836"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://puppet.com/security/cve/cve-2014-0082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2014/02/18/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/57376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/57836"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://puppet.com/security/cve/cve-2014-0082"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2024-11-21 01:59
Severity ?
Summary
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1794.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0008.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0469.html
secalert@redhat.comhttp://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/
secalert@redhat.comhttp://www.debian.org/security/2014/dsa-2888
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ
secalert@redhat.comhttps://puppet.com/security/cve/cve-2013-6417
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1794.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0008.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0469.html
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2888
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ
af854a3a-2127-422b-91ae-364da2661108https://puppet.com/security/cve/cve-2013-6417
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 3.0.4
rubyonrails ruby_on_rails 3.1.11
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.15
rubyonrails ruby_on_rails 3.2.15
rubyonrails rails *
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "75842F7D-B1B1-48BA-858F-01148867B3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE65D701-AA6E-48E4-B62B-C22DEE863503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17B1E475-C873-4561-9348-027721C08D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F53FB7-A292-4273-BFBE-E231235E845D",
              "versionEndIncluding": "3.2.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F0635C-4EBF-4EA3-9756-A85A3BB5026B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A325F57E-0055-4279-9ED7-A26E75FC38E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9A3BA4AE-B4F0-4204-AFA1-1016F0A6F7AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "991F368C-CEB5-4DE6-A7EE-C341F358A4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01DB164E-E08E-4649-84BD-15B4159A3AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E0F7ECFB-86A1-4F00-AD47-971FA23C6D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:*:-:*:*:*:*:*:*",
              "matchCriteriaId": "1FDABDDD-F2B1-4335-ABB9-76B58AEE9CCF",
              "versionEndIncluding": "4.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155."
    },
    {
      "lang": "es",
      "value": "actoinpack/lib/action_dispatch/http/request.rb en Ruby on Rails anteriores a 3.2.16 y 4.x anteriores a 4.0.2 no considera correctamente las diferencias en la gesti\u00f3n de par\u00e1metros entre el componente Active Record y la implementaci\u00f3n de JSON, lo cual permite a atacantes remotos sortear restricciones de consultas a la base de datos y ejecutar comprobaciones NULL o provocar falta de cl\u00e1usulas WHERE a trav\u00e9s de una petici\u00f3n manipulada que aprovecha (1) middleware Rack de terceros o (2) middleware Rack propio. NOTA: esta vulnerabilidad existe debido a una correcci\u00f3n incompleta de CVE-2013-0155."
    }
  ],
  "id": "CVE-2013-6417",
  "lastModified": "2024-11-21T01:59:11.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-07T00:55:03.773",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2014/dsa-2888"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://puppet.com/security/cve/cve-2013-6417"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://puppet.com/security/cve/cve-2013-6417"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-12-29 16:29
Modified
2024-11-21 03:18
Summary
SQL injection vulnerability in the 'reorder' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input
Impacted products
Vendor Product Version
rubyonrails ruby_on_rails *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F46C1792-F008-4AF6-A46D-1E2B262EC13F",
              "versionEndIncluding": "5.1.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the \u0027reorder\u0027 method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the \u0027name\u0027 parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input"
    },
    {
      "lang": "es",
      "value": "** EN DISPUTA ** La vulnerabilidad de inyecci\u00f3n SQL en el m\u00e9todo \u0027reorder\u0027 de Ruby on Rails 5.1.4 y anteriores permite a los atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \u0027name\u0027. NOTA: El proveedor no est\u00e1 de acuerdo con este punto porque la documentaci\u00f3n indica que este m\u00e9todo no est\u00e1 dise\u00f1ado para ser utilizado con datos no confiables."
    }
  ],
  "id": "CVE-2017-17920",
  "lastModified": "2024-11-21T03:18:58.820",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-12-29T16:29:00.343",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-06-30 15:55
Modified
2024-11-21 01:27
Severity ?
Summary
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method."
    },
    {
      "lang": "es",
      "value": "La caracter\u00edstica de prevenci\u00f3n de secuencias de comandos en sitios cruzados (XSS) de Ruby en Rails v2.x anterior a v2.3.12, v3.0.x anterior a v3.0.8, y v3.1.x anterior a v3.1.0.rc2  no maneja adecuadamente la mutaci\u00f3n de b\u00fafers seguros, esto facilita a los atacantes remotos provocar ataques XSS a trav\u00e9s de cadenas manipuladas de una aplicaci\u00f3n que usa un m\u00e9todo de cadena problem\u00e1tico, como se ha demostrado con el sub-m\u00e9todo."
    }
  ],
  "id": "CVE-2011-2197",
  "lastModified": "2024-11-21T01:27:47.783",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-06-30T15:55:01.910",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/06/09/2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/06/13/9"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44789"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/06/09/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/06/13/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-03-19 22:55
Modified
2024-11-21 01:50
Severity ?
Summary
The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F0635C-4EBF-4EA3-9756-A85A3BB5026B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference."
    },
    {
      "lang": "es",
      "value": "El backend ActiveSupport::XmlMini_JDOM en lib/active_support/xml_mini/jdom.rb en el  componente Active Support en Ruby on Rails v3.0.x y 3.1.x anterior a v3.1.12 y v3.2.x anterior a v3.2.13, cuando se usa JRuby, no restringe adecuadamente las capacidades del validador XML, lo que permite a atacantes remotos leer archivos de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (consumo de recursos) a trav\u00e9s de vectores que involucran (1) una TDT externa o (2) una declaraci\u00f3n de entidad externa junto con una referencia a una entidad."
    }
  ],
  "id": "CVE-2013-1856",
  "lastModified": "2024-11-21T01:50:31.833",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-03-19T22:55:01.070",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-10 10:34
Modified
2024-11-21 01:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the prompt field to the select_tag helper.
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the prompt field to the select_tag helper."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en actionpack/lib/action_view/helpers/form_tag_helper.rb en Ruby on Rails v3.x anterior a v3.0.17, v3.1.x anterior a v3.1.8, y v3.2.x anterior a v3.2.8 permite la administraci\u00f3n remota los atacantes para inyectar secuencias de comandos web o HTML a trav\u00e9s del campo del sistema para el (helper) select_tag."
    }
  ],
  "id": "CVE-2012-3463",
  "lastModified": "2024-11-21T01:40:55.700",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-10T10:34:47.843",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-09-07 19:28
Modified
2024-11-21 02:55
Summary
Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.
References
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-1855.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-1856.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-1857.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-1858.html
secalert@redhat.comhttp://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/Release Notes, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3651Third Party Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2016/08/11/3Third Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/92430
secalert@redhat.comhttps://groups.google.com/forum/#%21topic/ruby-security-ann/8B2iV2tPRSE
secalert@redhat.comhttps://puppet.com/security/cve/cve-2016-6316
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1855.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1856.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1857.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1858.html
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3651Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2016/08/11/3Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/92430
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/#%21topic/ruby-security-ann/8B2iV2tPRSE
af854a3a-2127-422b-91ae-364da2661108https://puppet.com/security/cve/cve-2016-6316
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.1.12
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.8
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.9
rubyonrails rails 3.2.9
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.15
rubyonrails rails 3.2.15
rubyonrails rails 3.2.16
rubyonrails rails 3.2.17
rubyonrails rails 3.2.18
rubyonrails rails 3.2.21
rubyonrails rails 3.2.22.2
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.2
rubyonrails rails 4.0.3
rubyonrails rails 4.0.4
rubyonrails rails 4.0.4
rubyonrails rails 4.0.5
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.7
rubyonrails rails 4.0.8
rubyonrails rails 4.0.9
rubyonrails rails 4.0.10
rubyonrails rails 4.0.10
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.1
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.3
rubyonrails rails 4.1.4
rubyonrails rails 4.1.5
rubyonrails rails 4.1.6
rubyonrails rails 4.1.6
rubyonrails rails 4.1.6
rubyonrails rails 4.1.7
rubyonrails rails 4.1.7.1
rubyonrails rails 4.1.8
rubyonrails rails 4.1.9
rubyonrails rails 4.1.9
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.12
rubyonrails rails 4.1.12
rubyonrails rails 4.1.13
rubyonrails rails 4.1.13
rubyonrails rails 4.1.14
rubyonrails rails 4.1.14
rubyonrails rails 4.1.14
rubyonrails rails 4.1.14.2
rubyonrails rails 4.1.15
rubyonrails rails 4.1.15
rubyonrails rails 4.1.16
rubyonrails rails 4.1.16
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.2
rubyonrails rails 4.2.3
rubyonrails rails 4.2.3
rubyonrails rails 4.2.4
rubyonrails rails 4.2.4
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5.1
rubyonrails rails 4.2.5.2
rubyonrails rails 4.2.6
rubyonrails rails 4.2.6
rubyonrails rails 4.2.7
rubyonrails rails 4.2.7
rubyonrails rails 5.0.0
rubyonrails rails 5.0.0
rubyonrails rails 5.0.0
rubyonrails rails 5.0.0
rubyonrails rails 5.0.0
rubyonrails rails 5.0.0
rubyonrails rails 5.0.0
rubyonrails ruby_on_rails 3.0.4
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.15
rubyonrails ruby_on_rails 3.2.15
rubyonrails ruby_on_rails 3.2.19
rubyonrails ruby_on_rails 3.2.20
rubyonrails ruby_on_rails 3.2.22
rubyonrails ruby_on_rails 3.2.22.1
rubyonrails ruby_on_rails 4.0.10
rubyonrails ruby_on_rails 4.0.11
rubyonrails ruby_on_rails 4.0.11.1
rubyonrails ruby_on_rails 4.0.12
rubyonrails ruby_on_rails 4.0.13
rubyonrails ruby_on_rails 4.0.13
rubyonrails ruby_on_rails 4.1.11
rubyonrails ruby_on_rails 4.1.14.1
rubyonrails ruby_on_rails 5.0.0
rubyonrails ruby_on_rails 5.0.0
debian debian_linux 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "11F211A0-AC69-482A-B659-AEE7BE4E4CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "42232305-7D62-4692-81CC-B7E9CE642372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DD2818D7-5006-4486-AE55-47B63C8F114B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "83EF40E0-1C62-415A-892B-C071B109D924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "22D707A0-7CA9-4CED-8DBA-1B50B57EDB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0C3CADF8-3316-4514-9A70-AD3DF16B19E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "D0D4AF31-A47B-4BE3-A99B-9A0EB7C53D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "75842F7D-B1B1-48BA-858F-01148867B3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE65D701-AA6E-48E4-B62B-C22DEE863503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17B1E475-C873-4561-9348-027721C08D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0406FF0-30F5-40E2-B9B8-FE465D923DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.15:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6646610D-279B-4AEC-B445-981E7784EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F51980-EAD9-4E4D-A2E7-1FACFA80AAB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC02A7D1-CB1A-4793-86E3-CF88D0BCDF83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A499584B-6E2E-42F3-B0CE-DA7BDD732897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE982FFD-D30F-4872-9C36-74DE50405B18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA770BE3-DD37-45C9-9E6D-8D3407D1A5D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "254884EE-EBA4-45D0-9704-B5CB22569668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C913A56-959D-44F1-BD89-D246C66D1F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5D5BA926-38EE-47BE-9D16-FDCF360A503B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "18EA25F1-279A-4F1A-883D-C064369F592E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD794856-6F30-4ABF-8AE4-720BB75E6F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4199B8B-A6F9-4BFD-8D27-0E663D8C579D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11E76A3-FA5B-4038-AB52-3D7D5E54D8A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C583ACDE-55D5-4D2F-838F-BEC5BDCDE3B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "767C481D-6616-4CA9-9A9B-C994D9121796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5496953-0C5E-45F8-A7FB-240CEC2CCEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CA46B621-125E-497F-B2DE-91C989B25936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B3239443-2E19-4540-BA0C-05A27E44CB6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "104AC9CF-6611-4469-9852-7FDAF4EC7638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC9E1864-B1E5-42C3-B4AF-9A002916B66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AC91AA-6A9A-43B4-B3E9-A66A34B6E612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A462C151-982E-4A83-A376-025015F40645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "660C2AD2-CEC8-4391-84AF-27515A88B29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "578CC013-776B-4868-B448-B7ACAF3AF832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C310EA3E-399A-48FD-8DE9-6950E328CF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "293B2998-5169-4960-BEC4-21DAC837E32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "FB42A8E7-D273-4CE2-9182-D831D8089BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DB757DFD-BF47-4483-A2C0-DF37F7D10989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6C375F2-5027-4B55-9112-C5DD2F787E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8D57F-9849-428C-B8E9-D0A1020728BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0359DA8-6B41-46C5-AA95-41B1B366DD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0965BDB6-9644-465C-AA32-9278B2D53197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B15CF-37C1-4C9B-8457-4A8C9A480188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "072EB16D-1325-4869-B156-65E786A834C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "847B3C3D-8656-404D-A954-09C159EDC8E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CA2D50-B33C-4088-BDDF-EB964C9A092C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CADB5989-5260-4F60-ACF2-BEB6D7F97654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9036E3C7-0AD5-489D-BCEE-31DFE13F5ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "509597D0-22E1-4BE8-95AD-C54FE4D15FA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B86E26CB-2376-4EBC-913C-B354E2D6711B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "539C550D-FEDD-415E-95AE-40E1AE2BAF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5150753-E86D-4859-A046-97B83EAE2C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C5B869-74FC-4051-A103-A721332B3CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C31EBD2-CD2D-4D38-AA51-A5A56487939A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F11E9791-7BCE-43E5-A4BA-6449623FE4F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FBD4E4-0BCD-49E1-BA84-86621B7C4556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CE521626-2876-455C-9D99-DB74726DC724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2DFDD32E-F49E-47F7-B033-B6C3C0E07FC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "DCBA26F1-FBBA-444D-9C14-F15AB14A4FC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "16D3B0EA-49F7-401A-A1D9-437429D33EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D1EB17-EE67-48E5-B637-AA9A75D397F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "17EBD8B4-C4D3-44A6-9DC1-89D948F126A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2B1711A-5541-412C-A5A0-274CEAB9E387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FCB08CD7-E9B9-454F-BAF7-96162D177677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3AF00C3-93D9-4284-BCB9-40E42CB8386E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0D3DA0B4-E374-4ED4-8C3B-F723C968666F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B1730A9A-6810-4470-AE6C-A5356D5BFF43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE4B688E-8638-4539-961D-4FDCBEB4B1C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0346BB-9180-4FE5-AA35-DC466675ED5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "2D6DD9BF-F174-4BE3-9910-BDE3658DC36E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B79E40-75CB-4EBB-8A4B-AF41AED2AE1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.16:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89B4DCF6-1A21-4B91-ACB4-7DE05487C497",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A68D41F-36A9-4B77-814D-996F4E48FA79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "709A19A5-8FD1-4F9C-A38C-F06242A94D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8104482C-E8F5-40A7-8B27-234FEF725FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF8677-EA00-4F7E-BFF9-272482206DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8D7DF5CD-DA28-492D-B5EE-D252ECCC8D96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "85435026-9855-4BF4-A436-832628B005FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56C2308F-A590-47B0-9791-7865D189196F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9A266882-DABA-4A4C-88E6-60E993EE0947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F1142C-3BFB-4B72-A033-81E20DB19D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1FA738A1-227B-4665-B65E-666883FFAE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6F00718C-A9E8-4E85-8DA6-33BF11F2DCCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "10789A2D-6401-4119-BFBE-2EE4C16216D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "70ABD462-7142-4831-8EB6-801EC1D05573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D717DB-7C80-48AA-A774-E291D2E75D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "06B357FB-0307-4EFA-9C5B-3C2CDEA48584",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E4BD8840-0F1C-49D3-B843-9CFE64948018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D5B492-43F9-470F-BD21-6EFD93E78453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4EC1F602-D48C-458A-A063-4050BE3BB25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A1C015-56AD-489C-B301-68CF1DBF1BEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD191625-ACE2-46B6-9AAD-12D682C732C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "02C7DB56-267B-4057-A9BA-36D1E58C6282",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC163D49-691B-4125-A983-6CF6F6D86DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B537D1-1584-4D15-9C75-08ED4D45DC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A19315C-9A9D-45FE-81C8-074744825B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1E3B4233-E117-4E77-A60D-3DFD5073154D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "392CF25B-8400-4185-863F-D6353B664FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3037282A-863A-4C92-A40C-4D436D2621C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "AF8F94CF-D504-4165-A69E-3F1198CB162A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*",
              "matchCriteriaId": "C8C25977-AB6C-45E1-8956-871EB31B36BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "5F0AB6B0-3506-4332-A183-309FAC4882CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "6D7B4EBC-B634-4AD7-9F7A-54D14821D5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "F844FB25-6E27-412F-8394-A7FB15AC1191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A4E608ED-F4AB-4F29-B34E-2841A59580A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6320DD44-7D7E-4075-A865-BEAFF86FDA9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A325F57E-0055-4279-9ED7-A26E75FC38E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9A3BA4AE-B4F0-4204-AFA1-1016F0A6F7AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "991F368C-CEB5-4DE6-A7EE-C341F358A4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01DB164E-E08E-4649-84BD-15B4159A3AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E0F7ECFB-86A1-4F00-AD47-971FA23C6D21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "69702127-AB96-4FE0-9AC4-FBE7B8CA77E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "48D71F7B-CF93-41D4-A824-51CB11F08692",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "60CE659B-DF49-477B-8879-C33823F6527F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EF68196-7C9E-40FE-868D-C42FF82D52EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9C8E749B-2908-442A-99F0-91E2772336ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E43D2D7-89AE-4805-9732-F1C601D8D8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3D8911-060D-435D-ACA2-E29271170CAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7A4939-16CF-450D-846A-75B231E32D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C964D4A2-3F39-4CC7-A028-B42C94DDB56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3B54D9FE-0A38-4053-9F3C-8831E2DD2BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "23FD6D82-9A14-4BD4-AA00-1875F0962ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91AB2B26-A6F1-44D2-92EB-8078DD6FD63A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E971CF9D-B807-4A74-81EB-D7CB4E5B8099",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:5.0.0:racecar1:*:*:*:*:*:*",
              "matchCriteriaId": "0B31291C-CBB5-4E51-B0AC-4144E8BAD65B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as \"HTML safe\" and used as attribute values in tag handlers."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en Action View en Ruby en Rails 3.x en versiones anteriores a 3.2.22.3, 4.x en versiones anteriores a 4.2.7.1 y 5.x en versiones anteriores a 5.0.0.1 podr\u00eda permitir a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de texto declarado como \"HTML safe\" y utilizado como valores de atributos en los manejadores de etiquetas."
    }
  ],
  "id": "CVE-2016-6316",
  "lastModified": "2024-11-21T02:55:53.280",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-09-07T19:28:10.067",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1855.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1856.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1857.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1858.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3651"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/08/11/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/92430"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/#%21topic/ruby-security-ann/8B2iV2tPRSE"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://puppet.com/security/cve/cve-2016-6316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1855.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1856.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1857.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1858.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3651"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/08/11/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/92430"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/#%21topic/ruby-security-ann/8B2iV2tPRSE"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://puppet.com/security/cve/cve-2016-6316"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-06-22 14:55
Modified
2024-11-21 01:39
Severity ?
Summary
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "['xyz', nil]" values, a related issue to CVE-2012-2660.
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F046DC2-971A-46E6-A61B-AD39B954D634",
              "versionEndIncluding": "3.0.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain \"[\u0027xyz\u0027, nil]\" values, a related issue to CVE-2012-2660."
    },
    {
      "lang": "es",
      "value": "actionpack/lib/action_dispatch/http/request.rb en Ruby on Rails antes de la version v3.0.14, en la v3.1.x antes de v3.1.6 y v3.2.x antes de v 3.2.6 no considera adecuadamente las diferencias en el manejo de par\u00e1metros entre el componente Active Record y la interfaz Rack, lo que permite a atacantes remotos evitar las restricciones de consulta de bases de datos y realizar comprobaciones de nulos a trav\u00e9s de solicitudes hechas a mano, por ejemplo con los valores  \"[\u0027xyz\u0027, nil]\". Es un problema relacionado con el CVE-2012-2660."
    }
  ],
  "id": "CVE-2012-2694",
  "lastModified": "2024-11-21T01:39:27.720",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-22T14:55:01.097",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-06-22 14:55
Modified
2024-11-21 01:39
Severity ?
Summary
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2694.
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain \"[nil]\" values, a related issue to CVE-2012-2694."
    },
    {
      "lang": "es",
      "value": "actionpack/lib/action_dispatch/http/request.rb en Ruby on Rails antes de v3.0.13, v3.1.x antes de v3.1.5 y v3.2.x antes de v3.2.4 no tienen debidamente en cuenta las diferencias en el manejo de par\u00e1metros entre el componente Active Record y la interfaz Rack, lo que permite a atacantes remotos evitar las restricciones de consulta de bases de datos y realizar comprobaciones de nulos a trav\u00e9s de una solicitud hecha a mano, por ejemplo con valores \"[nil]\". Se trata de un problema relacionado con el CVE-2012-2694."
    }
  ],
  "id": "CVE-2012-2660",
  "lastModified": "2024-11-21T01:39:23.550",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-22T14:55:01.020",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-02-16 02:59
Modified
2024-11-21 02:37
Summary
The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0296.html
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3464
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2016/01/25/8
secalert@redhat.comhttp://www.securityfocus.com/bid/81803
secalert@redhat.comhttp://www.securitytracker.com/id/1034816
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0296.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3464
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2016/01/25/8
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/81803
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1034816
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ
Impacted products
Vendor Product Version
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.2
rubyonrails rails 4.0.3
rubyonrails rails 4.0.4
rubyonrails rails 4.0.4
rubyonrails rails 4.0.5
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.6
rubyonrails rails 4.0.7
rubyonrails rails 4.0.8
rubyonrails rails 4.0.9
rubyonrails rails 4.0.10
rubyonrails rails 4.0.10
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.0
rubyonrails rails 4.1.1
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.2
rubyonrails rails 4.1.3
rubyonrails rails 4.1.4
rubyonrails rails 4.1.5
rubyonrails rails 4.1.6
rubyonrails rails 4.1.6
rubyonrails rails 4.1.6
rubyonrails rails 4.1.7
rubyonrails rails 4.1.7.1
rubyonrails rails 4.1.8
rubyonrails rails 4.1.9
rubyonrails rails 4.1.9
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.10
rubyonrails rails 4.1.12
rubyonrails rails 4.1.12
rubyonrails rails 4.1.13
rubyonrails rails 4.1.13
rubyonrails rails 4.1.14
rubyonrails rails 4.1.14
rubyonrails rails 4.1.14
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.0
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.1
rubyonrails rails 4.2.2
rubyonrails rails 4.2.3
rubyonrails rails 4.2.3
rubyonrails rails 4.2.4
rubyonrails rails 4.2.4
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5
rubyonrails rails 4.2.5
rubyonrails rails 5.0.0
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 4.0.10
rubyonrails ruby_on_rails 4.0.11
rubyonrails ruby_on_rails 4.0.11.1
rubyonrails ruby_on_rails 4.0.12
rubyonrails ruby_on_rails 4.0.13
rubyonrails ruby_on_rails 4.0.13
rubyonrails ruby_on_rails 4.1.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "254884EE-EBA4-45D0-9704-B5CB22569668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C913A56-959D-44F1-BD89-D246C66D1F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5D5BA926-38EE-47BE-9D16-FDCF360A503B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "18EA25F1-279A-4F1A-883D-C064369F592E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD794856-6F30-4ABF-8AE4-720BB75E6F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4199B8B-A6F9-4BFD-8D27-0E663D8C579D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11E76A3-FA5B-4038-AB52-3D7D5E54D8A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C583ACDE-55D5-4D2F-838F-BEC5BDCDE3B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "767C481D-6616-4CA9-9A9B-C994D9121796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5496953-0C5E-45F8-A7FB-240CEC2CCEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CA46B621-125E-497F-B2DE-91C989B25936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B3239443-2E19-4540-BA0C-05A27E44CB6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "104AC9CF-6611-4469-9852-7FDAF4EC7638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC9E1864-B1E5-42C3-B4AF-9A002916B66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AC91AA-6A9A-43B4-B3E9-A66A34B6E612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A462C151-982E-4A83-A376-025015F40645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "660C2AD2-CEC8-4391-84AF-27515A88B29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "578CC013-776B-4868-B448-B7ACAF3AF832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C310EA3E-399A-48FD-8DE9-6950E328CF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "293B2998-5169-4960-BEC4-21DAC837E32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "FB42A8E7-D273-4CE2-9182-D831D8089BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DB757DFD-BF47-4483-A2C0-DF37F7D10989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6C375F2-5027-4B55-9112-C5DD2F787E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8D57F-9849-428C-B8E9-D0A1020728BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0359DA8-6B41-46C5-AA95-41B1B366DD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0965BDB6-9644-465C-AA32-9278B2D53197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B15CF-37C1-4C9B-8457-4A8C9A480188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "072EB16D-1325-4869-B156-65E786A834C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "847B3C3D-8656-404D-A954-09C159EDC8E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CA2D50-B33C-4088-BDDF-EB964C9A092C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CADB5989-5260-4F60-ACF2-BEB6D7F97654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9036E3C7-0AD5-489D-BCEE-31DFE13F5ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "509597D0-22E1-4BE8-95AD-C54FE4D15FA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B86E26CB-2376-4EBC-913C-B354E2D6711B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "539C550D-FEDD-415E-95AE-40E1AE2BAF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5150753-E86D-4859-A046-97B83EAE2C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C5B869-74FC-4051-A103-A721332B3CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C31EBD2-CD2D-4D38-AA51-A5A56487939A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F11E9791-7BCE-43E5-A4BA-6449623FE4F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FBD4E4-0BCD-49E1-BA84-86621B7C4556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CE521626-2876-455C-9D99-DB74726DC724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2DFDD32E-F49E-47F7-B033-B6C3C0E07FC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "DCBA26F1-FBBA-444D-9C14-F15AB14A4FC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "16D3B0EA-49F7-401A-A1D9-437429D33EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D1EB17-EE67-48E5-B637-AA9A75D397F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "17EBD8B4-C4D3-44A6-9DC1-89D948F126A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2B1711A-5541-412C-A5A0-274CEAB9E387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FCB08CD7-E9B9-454F-BAF7-96162D177677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3AF00C3-93D9-4284-BCB9-40E42CB8386E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0D3DA0B4-E374-4ED4-8C3B-F723C968666F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B1730A9A-6810-4470-AE6C-A5356D5BFF43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A68D41F-36A9-4B77-814D-996F4E48FA79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "709A19A5-8FD1-4F9C-A38C-F06242A94D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8104482C-E8F5-40A7-8B27-234FEF725FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF8677-EA00-4F7E-BFF9-272482206DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8D7DF5CD-DA28-492D-B5EE-D252ECCC8D96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "85435026-9855-4BF4-A436-832628B005FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56C2308F-A590-47B0-9791-7865D189196F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9A266882-DABA-4A4C-88E6-60E993EE0947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F1142C-3BFB-4B72-A033-81E20DB19D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1FA738A1-227B-4665-B65E-666883FFAE96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6F00718C-A9E8-4E85-8DA6-33BF11F2DCCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "10789A2D-6401-4119-BFBE-2EE4C16216D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "70ABD462-7142-4831-8EB6-801EC1D05573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D717DB-7C80-48AA-A774-E291D2E75D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "06B357FB-0307-4EFA-9C5B-3C2CDEA48584",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E4BD8840-0F1C-49D3-B843-9CFE64948018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D5B492-43F9-470F-BD21-6EFD93E78453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4EC1F602-D48C-458A-A063-4050BE3BB25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A1C015-56AD-489C-B301-68CF1DBF1BEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD191625-ACE2-46B6-9AAD-12D682C732C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "02C7DB56-267B-4057-A9BA-36D1E58C6282",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "AF8F94CF-D504-4165-A69E-3F1198CB162A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C068362-0D49-4117-BC96-780AA802CE4E",
              "versionEndIncluding": "3.2.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9C8E749B-2908-442A-99F0-91E2772336ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E43D2D7-89AE-4805-9732-F1C601D8D8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3D8911-060D-435D-ACA2-E29271170CAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7A4939-16CF-450D-846A-75B231E32D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C964D4A2-3F39-4CC7-A028-B42C94DDB56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3B54D9FE-0A38-4053-9F3C-8831E2DD2BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "23FD6D82-9A14-4BD4-AA00-1875F0962ACE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences."
    },
    {
      "lang": "es",
      "value": "El m\u00e9todo http_basic_authenticate_with en actionpack/lib/action_controller/metal/http_authentication.rb en la implementaci\u00f3n Basic Authentication en Action Controller en Ruby on Rails en versiones anteriores a 3.2.22.1, 4.0.x y 4.1.x en versiones anteriores a 4.1.14.1, 4.2.x en versiones anteriores a 4.2.5.1 y 5.x en versiones anteriores a 5.0.0.beta1.1 no usa el algoritmo de tiempo constante para verificar credenciales, lo que hace que sea m\u00e1s f\u00e1cil para atacantes remotos eludir la autenticaci\u00f3n mediante la medici\u00f3n de las diferencias de temporizaci\u00f3n."
    }
  ],
  "id": "CVE-2015-7576",
  "lastModified": "2024-11-21T02:37:00.807",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-02-16T02:59:00.110",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3464"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2016/01/25/8"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/81803"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1034816"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2016/01/25/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/81803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1034816"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-254"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-12-29 16:29
Modified
2024-11-21 03:18
Summary
SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input
Impacted products
Vendor Product Version
rubyonrails ruby_on_rails *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F46C1792-F008-4AF6-A46D-1E2B262EC13F",
              "versionEndIncluding": "5.1.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the \u0027order\u0027 method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the \u0027id desc\u0027 parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input"
    },
    {
      "lang": "es",
      "value": "**EN DISPUTA** Vulnerabilidad de inyecci\u00f3n SQL en el m\u00e9todo \"order\" en Ruby on Rails 5.1.4 y anteriores permite que atacantes remotos ejecuten comandos SQL arbitrarios mediante el par\u00e1metro \"id desc\". NOTA: El fabricante rechaza este problema porque la documentaci\u00f3n indica que este m\u00e9todo no esta destinado a utilizarse con datos de entrada no fiables."
    }
  ],
  "id": "CVE-2017-17919",
  "lastModified": "2024-11-21T03:18:58.603",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2017-12-29T16:29:00.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-01-04 04:46
Modified
2024-11-21 01:46
Severity ?
Summary
SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
References
cve@mitre.orghttp://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2013-0154.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2013-0155.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2013-0220.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2013-0544.html
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-201401-22.xml
cve@mitre.orghttp://www.securityfocus.com/bid/57084
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=889649Exploit, Patch
cve@mitre.orghttps://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source&output=gplain
af854a3a-2127-422b-91ae-364da2661108http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0154.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0155.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0220.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0544.html
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201401-22.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/57084
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=889649Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source&output=gplain
Impacted products
Vendor Product Version
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53AE7CCA-1E57-4925-A025-F1BBFCE70272",
              "versionEndIncluding": "3.0.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en el componente Active Record en Ruby on Rails antes de v3.0.18, v3.1.x antes de v3.1.9, y v3.2.x antes de v3.2.10, permite a atacantes remotos ejecutar comandos SQL a trav\u00e9s de una solicitud modificada que aprovecha el comportamiento incorrecto de buscadores din\u00e1micos en aplicaciones que pueden utilizar los tipos de datos inesperados en ciertas llamadas al m\u00e9todo find_by_."
    }
  ],
  "id": "CVE-2012-6496",
  "lastModified": "2024-11-21T01:46:12.500",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-01-04T04:46:02.947",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-201401-22.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/57084"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889649"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201401-22.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/57084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889649"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-10 10:34
Modified
2024-11-21 01:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a ' (quote) character.
Impacted products
Vendor Product Version
rubyonrails rails 0.9.1
rubyonrails rails 0.9.2
rubyonrails rails 0.9.3
rubyonrails rails 0.9.4
rubyonrails rails 0.9.4.1
rubyonrails rails 0.10.0
rubyonrails rails 0.10.1
rubyonrails rails 0.11.0
rubyonrails rails 0.11.1
rubyonrails rails 0.12.0
rubyonrails rails 0.12.1
rubyonrails rails 0.13.0
rubyonrails rails 0.13.1
rubyonrails rails 0.14.1
rubyonrails rails 0.14.2
rubyonrails rails 0.14.3
rubyonrails rails 0.14.4
rubyonrails rails 1.0.0
rubyonrails rails 1.1.0
rubyonrails rails 1.1.1
rubyonrails rails 1.1.2
rubyonrails rails 1.1.3
rubyonrails rails 1.1.4
rubyonrails rails 1.1.5
rubyonrails rails 1.1.6
rubyonrails rails 1.2.0
rubyonrails rails 1.2.1
rubyonrails rails 1.2.2
rubyonrails rails 1.2.3
rubyonrails rails 1.2.4
rubyonrails rails 1.2.5
rubyonrails rails 1.2.6
rubyonrails rails 1.9.5
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.1
rubyonrails rails 2.0.2
rubyonrails rails 2.0.4
rubyonrails rails 2.1.0
rubyonrails rails 2.1.1
rubyonrails rails 2.1.2
rubyonrails rails 2.2.0
rubyonrails rails 2.2.1
rubyonrails rails 2.2.2
rubyonrails rails 2.3.2
rubyonrails rails 2.3.3
rubyonrails rails 2.3.4
rubyonrails rails 2.3.9
rubyonrails rails 2.3.10
rubyonrails rails 2.3.11
rubyonrails rails 2.3.12
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 0.5.0
rubyonrails ruby_on_rails 0.5.5
rubyonrails ruby_on_rails 0.5.6
rubyonrails ruby_on_rails 0.5.7
rubyonrails ruby_on_rails 0.6.0
rubyonrails ruby_on_rails 0.6.5
rubyonrails ruby_on_rails 0.7.0
rubyonrails ruby_on_rails 0.8.0
rubyonrails ruby_on_rails 0.8.5
rubyonrails ruby_on_rails 0.9.0
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB938651-C874-4427-AF9B-E9564B258633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D59FAFB-5D48-4BD8-AD51-FF9A204E373D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE23CCE1-1713-4813-A0AB-1E10DBDA4D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "897109FF-2C37-458A-91A9-7407F3DFBC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "289B1633-AAF7-48BE-9A71-0577428EE531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947FD6D-CD0B-44EE-95B5-E513AF244905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3666B82-1880-4A43-900F-3656F3FB157A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06D18BA-A0AB-461B-B498-2F1759CBF37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBE7E0-C474-43A7-85E3-093C754A253F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7195418-A2E9-43E6-B29F-AEACC317E69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39485B13-3C71-4EC6-97CF-6C796650C5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B30A-65F0-4D63-9A09-B23E9FC8D550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62323F62-AD04-4F43-A566-718DDB4149CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E890B1-4237-4470-939A-4FC489E04520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F3B933-0F68-4F88-999C-0BE48BC88CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E13DAEA-F118-4CB2-88A5-54E3327B6B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33BF68-D887-4C67-8E8C-D2A6CD877FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFCB88D-D946-4510-8DDC-67C32A606589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E793287E-2BDA-4012-86F5-886B82510431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF706143-996C-4120-B620-3EDC977568DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7F32B-C760-4862-B6DB-C38FB2A9182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD68A034-73A2-4B1A-95DB-19AD3131F775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E78C912-E8FF-495F-B922-43C54D1E2180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B72C17-82C3-4930-9227-226C8E64C2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA59F311-B2B4-40EE-A878-64EF9F41581B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "035B47E9-A395-47D2-9164-A2A2CF878326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA55D29-C830-45EF-A3B3-BFA9EED88F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9356A6-D32A-487C-B743-1DA0D6C42FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C7616-8631-49AC-979C-4347067059AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC487B78-AAEA-4F0E-8C8B-F415013A381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BBBE2A-2BDA-4930-8E26-A1E3C6575F81",
              "versionEndIncluding": "3.0.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDC63D-6ED7-48AE-9D72-6419F54D4B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF12B2F-39D9-48D5-9620-DF378D199295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E1EAAF-7B49-498B-BFEB-357173824F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AD626-0AFA-4873-A701-C7716193A69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF69F60A-E8D3-4A4D-BBB5-DE42A1402262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D2B30-FF07-498B-A5E0-A77BAB402619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3141A-162C-4674-BD7B-E1539BAA0B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E73F12-0551-42D2-ACC3-223C98B69C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6BA0659-2287-4E95-B30D-2441CD96DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01A4699-32D3-459E-B731-4240C8157F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a \u0027 (quote) character."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en activesupport/lib/active_support/core_ext/string/output_safety.rb en Ruby on Rails anteriores a v3.0.17, v3.1.x anteriores a v3.1.8, y 3.2.x anteriores a v3.2.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores que implican el caracter \u0027 (comilla)."
    }
  ],
  "id": "CVE-2012-3464",
  "lastModified": "2024-11-21T01:40:55.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-10T10:34:47.890",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/50694"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-20 15:27
Modified
2024-11-21 02:01
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-02/msg00081.htmlThird Party Advisory
secalert@redhat.comhttp://openwall.com/lists/oss-security/2014/02/18/8Third Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0215.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0306.htmlThird Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/57376Permissions Required
secalert@redhat.comhttp://www.securityfocus.com/bid/65647Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1029782Third Party Advisory, VDB Entry
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2014/02/18/8Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0215.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0306.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/57376Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/65647Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1029782Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJThird Party Advisory
Impacted products
Vendor Product Version
rubyonrails rails 0.9.1
rubyonrails rails 0.9.2
rubyonrails rails 0.9.3
rubyonrails rails 0.9.4
rubyonrails rails 0.9.4.1
rubyonrails rails 0.10.0
rubyonrails rails 0.10.1
rubyonrails rails 0.11.0
rubyonrails rails 0.11.1
rubyonrails rails 0.12.0
rubyonrails rails 0.12.1
rubyonrails rails 0.13.0
rubyonrails rails 0.13.1
rubyonrails rails 0.14.1
rubyonrails rails 0.14.2
rubyonrails rails 0.14.3
rubyonrails rails 0.14.4
rubyonrails rails 1.0.0
rubyonrails rails 1.1.0
rubyonrails rails 1.1.1
rubyonrails rails 1.1.2
rubyonrails rails 1.1.3
rubyonrails rails 1.1.4
rubyonrails rails 1.1.5
rubyonrails rails 1.1.6
rubyonrails rails 1.2.0
rubyonrails rails 1.2.1
rubyonrails rails 1.2.2
rubyonrails rails 1.2.3
rubyonrails rails 1.2.4
rubyonrails rails 1.2.5
rubyonrails rails 1.2.6
rubyonrails rails 1.9.5
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.1
rubyonrails rails 2.0.2
rubyonrails rails 2.0.4
rubyonrails rails 2.1.0
rubyonrails rails 2.1.1
rubyonrails rails 2.1.2
rubyonrails rails 2.2.0
rubyonrails rails 2.2.1
rubyonrails rails 2.2.2
rubyonrails rails 2.3.0
rubyonrails rails 2.3.1
rubyonrails rails 2.3.2
rubyonrails rails 2.3.3
rubyonrails rails 2.3.4
rubyonrails rails 2.3.9
rubyonrails rails 2.3.10
rubyonrails rails 2.3.11
rubyonrails rails 2.3.12
rubyonrails rails 2.3.13
rubyonrails rails 2.3.14
rubyonrails rails 2.3.15
rubyonrails rails 2.3.16
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.15
rubyonrails rails 3.2.15
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.1
rubyonrails rails 4.0.2
rubyonrails rails 4.1.0
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 0.5.0
rubyonrails ruby_on_rails 0.5.5
rubyonrails ruby_on_rails 0.5.6
rubyonrails ruby_on_rails 0.5.7
rubyonrails ruby_on_rails 0.6.0
rubyonrails ruby_on_rails 0.6.5
rubyonrails ruby_on_rails 0.7.0
rubyonrails ruby_on_rails 0.8.0
rubyonrails ruby_on_rails 0.8.5
rubyonrails ruby_on_rails 0.9.0
rubyonrails ruby_on_rails 3.0.4
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.15
rubyonrails ruby_on_rails 3.2.15
opensuse opensuse 13.1
opensuse_project opensuse 12.3
redhat cloudforms 3.0
redhat enterprise_linux 6.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB938651-C874-4427-AF9B-E9564B258633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D59FAFB-5D48-4BD8-AD51-FF9A204E373D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE23CCE1-1713-4813-A0AB-1E10DBDA4D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "897109FF-2C37-458A-91A9-7407F3DFBC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "289B1633-AAF7-48BE-9A71-0577428EE531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947FD6D-CD0B-44EE-95B5-E513AF244905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3666B82-1880-4A43-900F-3656F3FB157A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06D18BA-A0AB-461B-B498-2F1759CBF37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBE7E0-C474-43A7-85E3-093C754A253F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7195418-A2E9-43E6-B29F-AEACC317E69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39485B13-3C71-4EC6-97CF-6C796650C5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B30A-65F0-4D63-9A09-B23E9FC8D550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62323F62-AD04-4F43-A566-718DDB4149CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E890B1-4237-4470-939A-4FC489E04520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F3B933-0F68-4F88-999C-0BE48BC88CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E13DAEA-F118-4CB2-88A5-54E3327B6B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33BF68-D887-4C67-8E8C-D2A6CD877FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFCB88D-D946-4510-8DDC-67C32A606589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E793287E-2BDA-4012-86F5-886B82510431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF706143-996C-4120-B620-3EDC977568DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7F32B-C760-4862-B6DB-C38FB2A9182F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD68A034-73A2-4B1A-95DB-19AD3131F775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E78C912-E8FF-495F-B922-43C54D1E2180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B72C17-82C3-4930-9227-226C8E64C2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA59F311-B2B4-40EE-A878-64EF9F41581B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "035B47E9-A395-47D2-9164-A2A2CF878326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA55D29-C830-45EF-A3B3-BFA9EED88F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9356A6-D32A-487C-B743-1DA0D6C42FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C7616-8631-49AC-979C-4347067059AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC487B78-AAEA-4F0E-8C8B-F415013A381E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CEB24FC-F068-4EBD-BDC8-AB5BC56130DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DF384-3992-43BF-8A5C-65FA53E9A77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7453BE5-91C8-42B2-9F75-FFE4038F29A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2FD44EB-E899-4FA8-985E-44B75134DDC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E13E309-2411-4E1D-B27F-BF5DDDD5D5C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E1C795F-CCAC-47AC-B809-BD5510310011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "75842F7D-B1B1-48BA-858F-01148867B3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE65D701-AA6E-48E4-B62B-C22DEE863503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17B1E475-C873-4561-9348-027721C08D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0406FF0-30F5-40E2-B9B8-FE465D923DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.15:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6646610D-279B-4AEC-B445-981E7784EE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "254884EE-EBA4-45D0-9704-B5CB22569668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C913A56-959D-44F1-BD89-D246C66D1F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5D5BA926-38EE-47BE-9D16-FDCF360A503B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "18EA25F1-279A-4F1A-883D-C064369F592E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD794856-6F30-4ABF-8AE4-720BB75E6F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "293B2998-5169-4960-BEC4-21DAC837E32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "005A14B0-1621-4A0C-A990-2B8B59C199B3",
              "versionEndIncluding": "3.2.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDC63D-6ED7-48AE-9D72-6419F54D4B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF12B2F-39D9-48D5-9620-DF378D199295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E1EAAF-7B49-498B-BFEB-357173824F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AD626-0AFA-4873-A701-C7716193A69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF69F60A-E8D3-4A4D-BBB5-DE42A1402262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D2B30-FF07-498B-A5E0-A77BAB402619",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3141A-162C-4674-BD7B-E1539BAA0B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E73F12-0551-42D2-ACC3-223C98B69C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6BA0659-2287-4E95-B30D-2441CD96DA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01A4699-32D3-459E-B731-4240C8157F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A325F57E-0055-4279-9ED7-A26E75FC38E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9A3BA4AE-B4F0-4204-AFA1-1016F0A6F7AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "991F368C-CEB5-4DE6-A7EE-C341F358A4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01DB164E-E08E-4649-84BD-15B4159A3AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E0F7ECFB-86A1-4F00-AD47-971FA23C6D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B91DE6A-D759-4B2C-982B-AF036B43798D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:cloudforms:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E497C765-C720-4566-BB73-705C36AEA59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de XSS en actionview/lib/action_view/helpers/number_helper.rb en Ruby on Rails anterior a 3.2.17, 4.0.x anterior a 4.0.3 y 4.1.x anterior a 4.1.0.beta2 permiten a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s del par\u00e1metro (1) format, (2) negative_format, o (3) units hacia la ayuda de (a) number_to_currency, (b) number_to_percentage, o (c) number_to_human."
    }
  ],
  "id": "CVE-2014-0081",
  "lastModified": "2024-11-21T02:01:19.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-02-20T15:27:09.140",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://openwall.com/lists/oss-security/2014/02/18/8"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://secunia.com/advisories/57376"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65647"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1029782"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://openwall.com/lists/oss-security/2014/02/18/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://secunia.com/advisories/57376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/65647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1029782"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-04-22 03:27
Modified
2024-11-21 01:53
Severity ?
Summary
The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks against Ruby on Rails applications via a crafted value, as demonstrated by unintended interaction between the "typed XML" feature and a MySQL database.
Impacted products
Vendor Product Version
rubyonrails rails 2.3.0
rubyonrails rails 2.3.1
rubyonrails rails 2.3.2
rubyonrails rails 2.3.3
rubyonrails rails 2.3.4
rubyonrails rails 2.3.9
rubyonrails rails 2.3.10
rubyonrails rails 2.3.11
rubyonrails rails 2.3.12
rubyonrails rails 2.3.13
rubyonrails rails 2.3.14
rubyonrails rails 2.3.15
rubyonrails rails 2.3.16
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CEB24FC-F068-4EBD-BDC8-AB5BC56130DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DF384-3992-43BF-8A5C-65FA53E9A77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7453BE5-91C8-42B2-9F75-FFE4038F29A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2FD44EB-E899-4FA8-985E-44B75134DDC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E13E309-2411-4E1D-B27F-BF5DDDD5D5C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E1C795F-CCAC-47AC-B809-BD5510310011",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks against Ruby on Rails applications via a crafted value, as demonstrated by unintended interaction between the \"typed XML\" feature and a MySQL database."
    },
    {
      "lang": "es",
      "value": "El componente Active Record en Ruby on Rails 2.3.x, 3.0.x, 3.1.x, y 3.2.x, no asegura que el tipo de dato declarado de una columna de la base de datos sea usado durante la comparaci\u00f3n con los valores de entrada almacenados en dicha columna, lo que facilita a atacantes remotos a llevar a cabo ataques de inyecci\u00f3n de tipos de datos (data-types) contra las aplicaciones de Ruby on Rails a trav\u00e9s de un valor manipulado, como se ha demostrado mediante una transacci\u00f3n entre la caracter\u00edstica \"typed XML\" y la base de datos de MySQL."
    }
  ],
  "id": "CVE-2013-3221",
  "lastModified": "2024-11-21T01:53:12.260",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-04-22T03:27:13.363",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2013/02/06/7"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2013/04/24/7"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.phenoelit.org/blog/archives/2013/02/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://gist.github.com/dakull/5442275"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2013/02/06/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2013/04/24/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.phenoelit.org/blog/archives/2013/02/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://gist.github.com/dakull/5442275"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-01-30 12:00
Modified
2024-11-21 01:47
Severity ?
Summary
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0201.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0202.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0203.html
secalert@redhat.comhttp://support.apple.com/kb/HT5784
secalert@redhat.comhttp://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2613
secalert@redhat.comhttp://www.kb.cert.org/vuls/id/628463US Government Resource
secalert@redhat.comhttps://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source&output=gplainVendor Advisory
secalert@redhat.comhttps://puppet.com/security/cve/cve-2013-0333
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0201.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0202.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0203.html
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5784
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2613
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/628463US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source&output=gplainVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://puppet.com/security/cve/cve-2013-0333



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CEB24FC-F068-4EBD-BDC8-AB5BC56130DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DF384-3992-43BF-8A5C-65FA53E9A77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7453BE5-91C8-42B2-9F75-FFE4038F29A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2FD44EB-E899-4FA8-985E-44B75134DDC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E13E309-2411-4E1D-B27F-BF5DDDD5D5C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156."
    },
    {
      "lang": "es",
      "value": "lib/active_support/json/backends/yaml.rb en Ruby on Rails v2.3.x anterior a v2.3.16 y v3.0.x anterior a v3.0.20 no convierte correctamente los datos de tipo JSON a datos YAML para el procesamiento por el analizador YAML, lo cual permite a atacantes remotos ejecutar c\u00f3digo arbitrario, conducir ataques de inyecci\u00f3n SQL, o saltare la autentificaci\u00f3n a trav\u00e9s de la modificaci\u00f3n de datos que disparan una descodificaci\u00f3n insegura, esta vulnerabilidad es diferente a CVE-2013-0156."
    }
  ],
  "id": "CVE-2013-0333",
  "lastModified": "2024-11-21T01:47:19.573",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-01-30T12:00:08.930",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0201.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0202.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0203.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2013/dsa-2613"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/628463"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://puppet.com/security/cve/cve-2013-0333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0201.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0202.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0203.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2613"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/628463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://puppet.com/security/cve/cve-2013-0333"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-06-22 14:55
Modified
2024-11-21 01:39
Severity ?
Summary
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.
Impacted products
Vendor Product Version
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails ruby_on_rails 3.0.4
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695."
    },
    {
      "lang": "es",
      "value": "El componente Active Record en Ruby on Rails v3.0.x antes de v3.0.13, v3.1.x antes de v3.1.5 y v3.2.x antes de 3.2.4 no implementan correctamente el paso de los datos de la solicitud a un m\u00e9todo \u0027where\u0027 en la clase ActiveRecord, lo que permite a atacantes remotos llevar a cabo determinados ataques de inyecci\u00f3n SQL a trav\u00e9s de par\u00e1metros de consulta anidadas que se aprovechan de una recursividad no deseada. Se trata de un problema relacionado con el CVE-2012-2695."
    }
  ],
  "id": "CVE-2012-2661",
  "lastModified": "2024-11-21T01:39:23.693",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-22T14:55:01.067",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source\u0026output=gplain"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-04-07 23:59
Modified
2024-11-21 02:47
Summary
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html
secalert@redhat.comhttp://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3509
secalert@redhat.comhttp://www.securityfocus.com/bid/83726
secalert@redhat.comhttp://www.securitytracker.com/id/1035122
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3509
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/83726
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035122
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "254884EE-EBA4-45D0-9704-B5CB22569668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C913A56-959D-44F1-BD89-D246C66D1F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5D5BA926-38EE-47BE-9D16-FDCF360A503B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "18EA25F1-279A-4F1A-883D-C064369F592E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD794856-6F30-4ABF-8AE4-720BB75E6F89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4199B8B-A6F9-4BFD-8D27-0E663D8C579D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11E76A3-FA5B-4038-AB52-3D7D5E54D8A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C583ACDE-55D5-4D2F-838F-BEC5BDCDE3B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "767C481D-6616-4CA9-9A9B-C994D9121796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5496953-0C5E-45F8-A7FB-240CEC2CCEB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CA46B621-125E-497F-B2DE-91C989B25936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B3239443-2E19-4540-BA0C-05A27E44CB6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "104AC9CF-6611-4469-9852-7FDAF4EC7638",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC9E1864-B1E5-42C3-B4AF-9A002916B66D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AC91AA-6A9A-43B4-B3E9-A66A34B6E612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A462C151-982E-4A83-A376-025015F40645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "578CC013-776B-4868-B448-B7ACAF3AF832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C310EA3E-399A-48FD-8DE9-6950E328CF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "293B2998-5169-4960-BEC4-21DAC837E32B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "FB42A8E7-D273-4CE2-9182-D831D8089BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DB757DFD-BF47-4483-A2C0-DF37F7D10989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6C375F2-5027-4B55-9112-C5DD2F787E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB8D57F-9849-428C-B8E9-D0A1020728BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0359DA8-6B41-46C5-AA95-41B1B366DD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0965BDB6-9644-465C-AA32-9278B2D53197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B15CF-37C1-4C9B-8457-4A8C9A480188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "072EB16D-1325-4869-B156-65E786A834C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "847B3C3D-8656-404D-A954-09C159EDC8E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CA2D50-B33C-4088-BDDF-EB964C9A092C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CADB5989-5260-4F60-ACF2-BEB6D7F97654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "509597D0-22E1-4BE8-95AD-C54FE4D15FA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B86E26CB-2376-4EBC-913C-B354E2D6711B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "539C550D-FEDD-415E-95AE-40E1AE2BAF1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5150753-E86D-4859-A046-97B83EAE2C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C5B869-74FC-4051-A103-A721332B3CF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F11E9791-7BCE-43E5-A4BA-6449623FE4F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CE521626-2876-455C-9D99-DB74726DC724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2DFDD32E-F49E-47F7-B033-B6C3C0E07FC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "DCBA26F1-FBBA-444D-9C14-F15AB14A4FC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "16D3B0EA-49F7-401A-A1D9-437429D33EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "17EBD8B4-C4D3-44A6-9DC1-89D948F126A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FCB08CD7-E9B9-454F-BAF7-96162D177677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0D3DA0B4-E374-4ED4-8C3B-F723C968666F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B1730A9A-6810-4470-AE6C-A5356D5BFF43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD4FBDC-F05B-4CDD-8928-7122397A7651",
              "versionEndIncluding": "3.2.22.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91AB2B26-A6F1-44D2-92EB-8078DD6FD63A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application\u0027s unrestricted use of the render method and providing a .. (dot dot) in a pathname.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto directorio en Action View en Ruby on Rails en versiones anteriores a 3.2.22.2 y 4.x en versiones anteriores a 4.1.14.2 permite a atacantes remotos leer archivos arbitrarios aprovechando el uso no restringido del m\u00e9todo render de una aplicaci\u00f3n y proporcionando un .. (punto punto) en un nombre de ruta. NOTA: esta vulnerabilidad existe por una soluci\u00f3n incompleta para CVE-2016-0752."
    }
  ],
  "id": "CVE-2016-2097",
  "lastModified": "2024-11-21T02:47:47.930",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-07T23:59:05.800",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3509"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/83726"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1035122"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3509"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/83726"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035122"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-11-21 21:46
Modified
2024-11-21 00:39
Severity ?
Summary
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
References
cve@mitre.orghttp://dev.rubyonrails.org/changeset/8177
cve@mitre.orghttp://dev.rubyonrails.org/ticket/10048Patch
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=307179
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
cve@mitre.orghttp://secunia.com/advisories/27781Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28136Vendor Advisory
cve@mitre.orghttp://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release
cve@mitre.orghttp://www.securityfocus.com/bid/26598
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA07-352A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4009Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4238Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://dev.rubyonrails.org/changeset/8177
af854a3a-2127-422b-91ae-364da2661108http://dev.rubyonrails.org/ticket/10048Patch
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=307179
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27781Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28136Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26598
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-352A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4009Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4238Vendor Advisory
Impacted products
Vendor Product Version
rubyonrails rails 0.9.1
rubyonrails rails 0.9.2
rubyonrails rails 0.9.3
rubyonrails rails 0.9.4
rubyonrails rails 0.9.4.1
rubyonrails rails 0.10.0
rubyonrails rails 0.10.1
rubyonrails rails 0.11.0
rubyonrails rails 0.11.1
rubyonrails rails 0.12.0
rubyonrails rails 0.12.1
rubyonrails rails 0.13.0
rubyonrails rails 0.13.1
rubyonrails rails 0.14.1
rubyonrails rails 0.14.2
rubyonrails rails 0.14.3
rubyonrails rails 0.14.4
rubyonrails rails 1.0.0
rubyonrails rails 1.1.0
rubyonrails rails 1.1.1
rubyonrails rails 1.1.2
rubyonrails rails 1.1.3
rubyonrails rails 1.1.4
rubyonrails rails 1.1.5
rubyonrails rails 1.1.6
rubyonrails rails 1.2.0
rubyonrails rails 1.2.1
rubyonrails rails 1.2.2
rubyonrails rails 1.2.3
rubyonrails rails 1.2.4
rubyonrails rails 1.2.5
rubyonrails rails 1.2.6
rubyonrails rails 1.9.5
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.0
rubyonrails rails 2.0.1
rubyonrails rails 2.0.2
rubyonrails rails 2.0.4
rubyonrails rails 2.1.0
rubyonrails rails 2.1.1
rubyonrails rails 2.1.2
rubyonrails rails 2.2.0
rubyonrails rails 2.2.1
rubyonrails rails 2.2.2
rubyonrails rails 2.3.2
rubyonrails rails 2.3.3
rubyonrails rails 2.3.4
rubyonrails rails 2.3.9
rubyonrails rails 2.3.10
rubyonrails rails 2.3.11
rubyonrails rails 2.3.12
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails ruby_on_rails 0.5.0
rubyonrails ruby_on_rails 0.5.5
rubyonrails ruby_on_rails 0.5.6
rubyonrails ruby_on_rails 0.5.7
rubyonrails ruby_on_rails 0.6.0
rubyonrails ruby_on_rails 0.6.5
rubyonrails ruby_on_rails 0.7.0
rubyonrails ruby_on_rails 0.8.0
rubyonrails ruby_on_rails 0.8.5
rubyonrails ruby_on_rails 0.9.0
rubyonrails ruby_on_rails 3.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB938651-C874-4427-AF9B-E9564B258633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D59FAFB-5D48-4BD8-AD51-FF9A204E373D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE23CCE1-1713-4813-A0AB-1E10DBDA4D12",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "897109FF-2C37-458A-91A9-7407F3DFBC99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "289B1633-AAF7-48BE-9A71-0577428EE531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947FD6D-CD0B-44EE-95B5-E513AF244905",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3666B82-1880-4A43-900F-3656F3FB157A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06D18BA-A0AB-461B-B498-2F1759CBF37D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61EBE7E0-C474-43A7-85E3-093C754A253F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7195418-A2E9-43E6-B29F-AEACC317E69E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39485B13-3C71-4EC6-97CF-6C796650C5B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A3B30A-65F0-4D63-9A09-B23E9FC8D550",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62323F62-AD04-4F43-A566-718DDB4149CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E890B1-4237-4470-939A-4FC489E04520",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F3B933-0F68-4F88-999C-0BE48BC88CF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E13DAEA-F118-4CB2-88A5-54E3327B6B9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC33BF68-D887-4C67-8E8C-D2A6CD877FB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BFCB88D-D946-4510-8DDC-67C32A606589",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E793287E-2BDA-4012-86F5-886B82510431",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF706143-996C-4120-B620-3EDC977568DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E7F32B-C760-4862-B6DB-C38FB2A9182F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD68A034-73A2-4B1A-95DB-19AD3131F775",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E78C912-E8FF-495F-B922-43C54D1E2180",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B72C17-82C3-4930-9227-226C8E64C2E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA59F311-B2B4-40EE-A878-64EF9F41581B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "035B47E9-A395-47D2-9164-A2A2CF878326",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA55D29-C830-45EF-A3B3-BFA9EED88F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9356A6-D32A-487C-B743-1DA0D6C42FA6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3C7616-8631-49AC-979C-4347067059AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC487B78-AAEA-4F0E-8C8B-F415013A381E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDC63D-6ED7-48AE-9D72-6419F54D4B84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF12B2F-39D9-48D5-9620-DF378D199295",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E1EAAF-7B49-498B-BFEB-357173824F4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AD626-0AFA-4873-A701-C7716193A69C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF69F60A-E8D3-4A4D-BBB5-DE42A1402262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "986D2B30-FF07-498B-A5E0-A77BAB402619",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E3141A-162C-4674-BD7B-E1539BAA0B7B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E73F12-0551-42D2-ACC3-223C98B69C7E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6BA0659-2287-4E95-B30D-2441CD96DA90",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B01A4699-32D3-459E-B731-4240C8157F71",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks.  NOTE: this is due to an incomplete fix for CVE-2007-5380."
    },
    {
      "lang": "es",
      "value": "El mecanismo de protecci\u00f3n de fijaci\u00f3n de sesi\u00f3n en el archivo cgi_process.rb en Rails versi\u00f3n 1.2.4, como es usado en Ruby on Rails, elimina el atributo :cookie_only de la constante DEFAULT_SESSION_OPTIONS, lo que causa efectivamente que cookie_only se aplique solo a la primera instancia de CgiRequest, lo que permite a atacantes remotos conducir ataques de fijaci\u00f3n de sesi\u00f3n. NOTA: esto es debido a una correcci\u00f3n incompleta para el CVE-2007-5380."
    }
  ],
  "id": "CVE-2007-6077",
  "lastModified": "2024-11-21T00:39:18.210",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-11-21T21:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://dev.rubyonrails.org/changeset/8177"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.rubyonrails.org/ticket/10048"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://docs.info.apple.com/article.html?artnum=307179"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27781"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28136"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26598"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.rubyonrails.org/changeset/8177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://dev.rubyonrails.org/ticket/10048"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=307179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27781"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28136"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26598"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4238"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-07 00:55
Modified
2024-11-21 01:59
Severity ?
Summary
actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1794.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0008.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1863.html
secalert@redhat.comhttp://secunia.com/advisories/57836
secalert@redhat.comhttp://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/Patch, Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2014/dsa-2888
secalert@redhat.comhttp://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
secalert@redhat.comhttps://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ
secalert@redhat.comhttps://puppet.com/security/cve/cve-2013-6414
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1794.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0008.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1863.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/57836
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2888
af854a3a-2127-422b-91ae-364da2661108http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
af854a3a-2127-422b-91ae-364da2661108https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ
af854a3a-2127-422b-91ae-364da2661108https://puppet.com/security/cve/cve-2013-6414
Impacted products
Vendor Product Version
rubyonrails rails *
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.0
rubyonrails rails 4.0.1
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.0
rubyonrails rails 3.0.1
rubyonrails rails 3.0.1
rubyonrails rails 3.0.2
rubyonrails rails 3.0.2
rubyonrails rails 3.0.3
rubyonrails rails 3.0.4
rubyonrails rails 3.0.5
rubyonrails rails 3.0.5
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.6
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.7
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.8
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.9
rubyonrails rails 3.0.10
rubyonrails rails 3.0.10
rubyonrails rails 3.0.11
rubyonrails rails 3.0.12
rubyonrails rails 3.0.12
rubyonrails rails 3.0.13
rubyonrails rails 3.0.13
rubyonrails rails 3.0.14
rubyonrails rails 3.0.16
rubyonrails rails 3.0.17
rubyonrails rails 3.0.18
rubyonrails rails 3.0.19
rubyonrails rails 3.0.20
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.0
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.1
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.2
rubyonrails rails 3.1.3
rubyonrails rails 3.1.4
rubyonrails rails 3.1.4
rubyonrails rails 3.1.5
rubyonrails rails 3.1.5
rubyonrails rails 3.1.6
rubyonrails rails 3.1.7
rubyonrails rails 3.1.8
rubyonrails rails 3.1.9
rubyonrails rails 3.1.10
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.0
rubyonrails rails 3.2.1
rubyonrails rails 3.2.2
rubyonrails rails 3.2.2
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.3
rubyonrails rails 3.2.4
rubyonrails rails 3.2.4
rubyonrails rails 3.2.5
rubyonrails rails 3.2.6
rubyonrails rails 3.2.7
rubyonrails rails 3.2.8
rubyonrails rails 3.2.9
rubyonrails rails 3.2.10
rubyonrails rails 3.2.11
rubyonrails rails 3.2.12
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails rails 3.2.13
rubyonrails ruby_on_rails *
rubyonrails ruby_on_rails 3.0.4
rubyonrails ruby_on_rails 3.1.11
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.14
rubyonrails ruby_on_rails 3.2.15
rubyonrails ruby_on_rails 3.2.15



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:*:-:*:*:*:*:*:*",
              "matchCriteriaId": "1FDABDDD-F2B1-4335-ABB9-76B58AEE9CCF",
              "versionEndIncluding": "4.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F07C641-48DF-43BE-9EB5-72B337C54846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D5D58C-DB79-41EA-81AE-5D95C48211B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE331D6D-99BA-4369-AD8B-B556DEE4955F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58304E17-ADFD-4686-9CCF-C1CA31843B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "05108EF0-81AD-4378-9843-5C23F2AC79A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C448F62-8231-4221-ADA0-C9B848AE03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "60255706-C44A-48CB-B98B-A1F0991CBC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0456E2E8-EF06-414E-8A7D-8005F0EB46B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EE4763-2495-4B6A-B72F-344967E51C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "75842F7D-B1B1-48BA-858F-01148867B3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FE65D701-AA6E-48E4-B62B-C22DEE863503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17B1E475-C873-4561-9348-027721C08D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F53FB7-A292-4273-BFBE-E231235E845D",
              "versionEndIncluding": "3.2.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F0635C-4EBF-4EA3-9756-A85A3BB5026B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A325F57E-0055-4279-9ED7-A26E75FC38E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9A3BA4AE-B4F0-4204-AFA1-1016F0A6F7AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "991F368C-CEB5-4DE6-A7EE-C341F358A4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01DB164E-E08E-4649-84BD-15B4159A3AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E0F7ECFB-86A1-4F00-AD47-971FA23C6D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching."
    },
    {
      "lang": "es",
      "value": "actionpack/lib/action_view/lookup_context.rb en Action View en Ruby on Rails 3.x anteriores a 3.2.16 y 4.x anteriores a 4.0.2 permite a atacantes remotos causar denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de una cabecera conteniendo un tipo MIME inv\u00e1lido que conduce a un cacheo excesivo."
    }
  ],
  "id": "CVE-2013-6414",
  "lastModified": "2024-11-21T01:59:10.590",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-07T00:55:03.693",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/57836"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2014/dsa-2888"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://puppet.com/security/cve/cve-2013-6414"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/57836"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://puppet.com/security/cve/cve-2013-6414"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-08-29 18:55
Modified
2024-11-21 01:29
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name.
References
secalert@redhat.comhttp://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source&output=gplainPatch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
secalert@redhat.comhttp://secunia.com/advisories/45921
secalert@redhat.comhttp://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6Patch
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2301
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/17/1Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/19/11Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/20/1Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/13Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/14
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/22/5Patch
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=731436Patch
secalert@redhat.comhttps://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037aPatch
af854a3a-2127-422b-91ae-364da2661108http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source&output=gplainPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45921
af854a3a-2127-422b-91ae-364da2661108http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2301
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/17/1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/19/11Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/20/1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/13Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/14
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/22/5Patch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=731436Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037aPatch



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EEAFDA-7782-4E1E-9058-205AD4BE9A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CAC748BB-BFC5-44F7-B633-CEEBB1279889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "38CF2C31-70BB-41D3-9462-0A8B9869A5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8584B37-7950-4C89-83D2-04E1ACDC60BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF12EA5D-5EB5-46A8-AC60-65B327D610AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B4B121-94BD-4E0F-8860-6239890043B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF211C-683E-4F7D-8C62-05B153AC1960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "456A2F7E-CC66-48C4-B028-353D2976837A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9806A84-2160-40EA-9960-AE7756CE4E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EC67D4-3D0F-4FF9-8197-71175DCB2723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1467583-23E9-4E2B-982D-80A356174BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC784C0-5618-4C32-8C17-BE7041656E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B38EAA4-E948-45A7-B6E5-7214F2B545E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECC8C49-5A46-4D23-81F9-8243F5D508DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "312848C5-BA35-4A48-B66D-195A5E1CD00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3BE7DFE-BA20-434B-A1DE-AD038B255C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DCEE5B21-C990-4705-8239-0D7B29DAEDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "65EE33B1-B079-4CDE-B9C2-F1613A4610DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "5CAAA20B-824F-4448-99DC-9712FE628073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEBDFB-0F30-454A-B74C-F820C9D2708B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
              "matchCriteriaId": "1D7CD8C1-95D1-477E-AD96-6582EC33BA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6F00D98-3D0F-40AF-AE4F-090B1E6B660C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9476CE55-69C0-45D3-B723-6F459C90BF05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
              "matchCriteriaId": "486F5BA6-BCF7-4691-9754-19D364B4438D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "112FC73B-A8BC-4EEA-9F4B-CCE685EF2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
              "matchCriteriaId": "E4498383-6FCA-4E17-A1FD-B0CE7EE50F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26565B1-2BA6-4A3C-9264-7FC9A1820B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E2D58-CB39-4832-B4D9-9C2E23B8E14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1F2466EA-7039-46A1-B4A3-8DACD1953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAB4E72-0A15-4B26-9B69-074C278568D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A085E105-9375-440A-80CB-9B23E6D7EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "25911E48-C5D7-4ED8-B4DB-7523A74CCF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B29674E3-CC80-446B-9A43-82594AE7A058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FF34D8CB-2B6D-4CB8-A206-108293BCFFE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "272268EE-E3E8-4683-B679-55D748877A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B69FD33-61FE-4F10-BBE1-215F59035D30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08D7CB5D-82EF-4A24-A792-938FAB40863D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8A044B21-47D5-468D-AF4A-06B3B5CC0824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2196F3D0-532A-40F9-843A-1DFBC8B63FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA932-6CB5-438C-94E4-824732A91BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "903E5524-5E45-48CE-A804-EDAEBE3A79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "08534AF2-F94E-4FB6-A572-4FB9827276D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "29E3B4A6-1346-4358-B7BC-84D00ED3ABBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "B52D7A6B-DD93-45F0-9186-18ABEFF28DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1CB1B12-99F5-430F-AE19-9A95C17FA123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "224BD488-0D7E-4F8B-9012-DE872DEB544C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias comandos en sitios cruzados (XSS) en strip_tags de actionpack/lib/action_controller/vendor/html-scanner/html/node.rb en Ruby on Rails v2.x antes de v2.3.13, v3.0.x antes de v3.0.10, y v3.1.x antes de v3.1.0.rc5 permite a atacantes remotos ejecutar secuencias de comandos web o HTML a trav\u00e9s una etiqueta con un nombre no v\u00e1lido."
    }
  ],
  "id": "CVE-2011-2931",
  "lastModified": "2024-11-21T01:29:18.147",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-08-29T18:55:01.503",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source\u0026output=gplain"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/45921"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2301"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731436"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source\u0026output=gplain"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/45921"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731436"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2017-17919
Vulnerability from cvelistv5
Published
2017-12-29 16:00
Modified
2024-08-05 21:06
Summary
SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ruby_on_rails",
            "vendor": "rubyonrails",
            "versions": [
              {
                "status": "affected",
                "version": "*"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2017-17919",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-23T15:16:52.640372Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-89",
                "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:11:55.128Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T21:06:49.394Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the \u0027order\u0027 method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the \u0027id desc\u0027 parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-01T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-17919",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED ** SQL injection vulnerability in the \u0027order\u0027 method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the \u0027id desc\u0027 parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/",
              "refsource": "MISC",
              "url": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-17919",
    "datePublished": "2017-12-29T16:00:00",
    "dateReserved": "2017-12-26T00:00:00",
    "dateUpdated": "2024-08-05T21:06:49.394Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2197
Vulnerability from cvelistv5
Published
2011-06-30 15:26
Modified
2024-08-06 22:53
Severity ?
Summary
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:53:17.178Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[rubyonrails-security] 20110607 Potential XSS Vulnerability in Ruby on Rails Applications",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source\u0026output=gplain"
          },
          {
            "name": "FEDORA-2011-8494",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html"
          },
          {
            "name": "FEDORA-2011-8580",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications"
          },
          {
            "name": "44789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44789"
          },
          {
            "name": "[oss-security] 20110609 CVE Request: Ruby on Rails 3/rails_xss XSS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/06/09/2"
          },
          {
            "name": "[oss-security] 20110613 Re: CVE Request: Ruby on Rails 3/rails_xss XSS",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/06/13/9"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-07T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[rubyonrails-security] 20110607 Potential XSS Vulnerability in Ruby on Rails Applications",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source\u0026output=gplain"
        },
        {
          "name": "FEDORA-2011-8494",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html"
        },
        {
          "name": "FEDORA-2011-8580",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications"
        },
        {
          "name": "44789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44789"
        },
        {
          "name": "[oss-security] 20110609 CVE Request: Ruby on Rails 3/rails_xss XSS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/06/09/2"
        },
        {
          "name": "[oss-security] 20110613 Re: CVE Request: Ruby on Rails 3/rails_xss XSS",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/06/13/9"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2197",
    "datePublished": "2011-06-30T15:26:00",
    "dateReserved": "2011-05-31T00:00:00",
    "dateUpdated": "2024-08-06T22:53:17.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-5189
Vulnerability from cvelistv5
Published
2008-11-21 11:00
Modified
2024-08-07 10:40
Severity ?
Summary
CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:40:17.237Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d"
          },
          {
            "name": "32359",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32359"
          },
          {
            "name": "SUSE-SR:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-03-03T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d"
        },
        {
          "name": "32359",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32359"
        },
        {
          "name": "SUSE-SR:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5189",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d",
              "refsource": "CONFIRM",
              "url": "http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d"
            },
            {
              "name": "32359",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32359"
            },
            {
              "name": "SUSE-SR:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
            },
            {
              "name": "http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing"
            },
            {
              "name": "http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5189",
    "datePublished": "2008-11-21T11:00:00",
    "dateReserved": "2008-11-20T00:00:00",
    "dateUpdated": "2024-08-07T10:40:17.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-2422
Vulnerability from cvelistv5
Published
2009-07-10 15:00
Modified
2024-08-07 05:52
Severity ?
Summary
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:14.795Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35702",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35702"
          },
          {
            "name": "35579",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35579"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest"
          },
          {
            "name": "ADV-2009-1802",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1802"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s"
          },
          {
            "name": "rubyonrails-validatedigest-sec-bypass(51528)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51528"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-06-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35702",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35702"
        },
        {
          "name": "35579",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35579"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest"
        },
        {
          "name": "ADV-2009-1802",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1802"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s"
        },
        {
          "name": "rubyonrails-validatedigest-sec-bypass(51528)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51528"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2422",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35702",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35702"
            },
            {
              "name": "35579",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35579"
            },
            {
              "name": "APPLE-SA-2010-03-29-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
            },
            {
              "name": "http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest"
            },
            {
              "name": "ADV-2009-1802",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1802"
            },
            {
              "name": "http://support.apple.com/kb/HT4077",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4077"
            },
            {
              "name": "http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s",
              "refsource": "MISC",
              "url": "http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s"
            },
            {
              "name": "rubyonrails-validatedigest-sec-bypass(51528)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51528"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2422",
    "datePublished": "2009-07-10T15:00:00",
    "dateReserved": "2009-07-10T00:00:00",
    "dateUpdated": "2024-08-07T05:52:14.795Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-17920
Vulnerability from cvelistv5
Published
2017-12-29 16:00
Modified
2024-08-05 21:06
Severity ?
Summary
SQL injection vulnerability in the 'reorder' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T21:06:49.547Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the \u0027reorder\u0027 method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the \u0027name\u0027 parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-01T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-17920",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED ** SQL injection vulnerability in the \u0027reorder\u0027 method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the \u0027name\u0027 parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/",
              "refsource": "MISC",
              "url": "https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-17920",
    "datePublished": "2017-12-29T16:00:00",
    "dateReserved": "2017-12-26T00:00:00",
    "dateUpdated": "2024-08-05T21:06:49.547Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-3465
Vulnerability from cvelistv5
Published
2012-08-10 10:00
Modified
2024-08-06 20:05
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:05:12.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
          },
          {
            "name": "50694",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50694"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          },
          {
            "name": "[rubyonrails-security] 20120810 XSS Vulnerability in strip_tags",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source\u0026output=gplain"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
        },
        {
          "name": "50694",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50694"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        },
        {
          "name": "[rubyonrails-security] 20120810 XSS Vulnerability in strip_tags",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source\u0026output=gplain"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-3465",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
            },
            {
              "name": "50694",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50694"
            },
            {
              "name": "RHSA-2013:0154",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
            },
            {
              "name": "[rubyonrails-security] 20120810 XSS Vulnerability in strip_tags",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source\u0026output=gplain"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-3465",
    "datePublished": "2012-08-10T10:00:00",
    "dateReserved": "2012-06-14T00:00:00",
    "dateUpdated": "2024-08-06T20:05:12.646Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2660
Vulnerability from cvelistv5
Published
2012-06-22 14:00
Modified
2024-08-06 19:42
Severity ?
Summary
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2694.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:31.885Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2012:1015",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html"
          },
          {
            "name": "SUSE-SU-2012:1012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
          },
          {
            "name": "openSUSE-SU-2012:0978",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
          },
          {
            "name": "SUSE-SU-2012:1014",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
          },
          {
            "name": "openSUSE-SU-2012:1066",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
          },
          {
            "name": "[rubyonrails-security] 20120531 Unsafe Query Generation Risk in Ruby on Rails (CVE-2012-2660)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source\u0026output=gplain"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain \"[nil]\" values, a related issue to CVE-2012-2694."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-09-07T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "SUSE-SU-2012:1015",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html"
        },
        {
          "name": "SUSE-SU-2012:1012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
        },
        {
          "name": "openSUSE-SU-2012:0978",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
        },
        {
          "name": "SUSE-SU-2012:1014",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
        },
        {
          "name": "openSUSE-SU-2012:1066",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
        },
        {
          "name": "[rubyonrails-security] 20120531 Unsafe Query Generation Risk in Ruby on Rails (CVE-2012-2660)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source\u0026output=gplain"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-2660",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain \"[nil]\" values, a related issue to CVE-2012-2694."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2012:1015",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html"
            },
            {
              "name": "SUSE-SU-2012:1012",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
            },
            {
              "name": "openSUSE-SU-2012:0978",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
            },
            {
              "name": "SUSE-SU-2012:1014",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
            },
            {
              "name": "openSUSE-SU-2012:1066",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
            },
            {
              "name": "[rubyonrails-security] 20120531 Unsafe Query Generation Risk in Ruby on Rails (CVE-2012-2660)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source\u0026output=gplain"
            },
            {
              "name": "RHSA-2013:0154",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2660",
    "datePublished": "2012-06-22T14:00:00",
    "dateReserved": "2012-05-14T00:00:00",
    "dateUpdated": "2024-08-06T19:42:31.885Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2695
Vulnerability from cvelistv5
Published
2012-06-22 14:00
Modified
2024-08-06 19:42
Severity ?
Summary
The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:31.701Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2012:1012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
          },
          {
            "name": "openSUSE-SU-2012:0978",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
          },
          {
            "name": "SUSE-SU-2012:1014",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
          },
          {
            "name": "openSUSE-SU-2012:1066",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          },
          {
            "name": "[rubyonrails-security] 20120612 Ruby on Rails SQL Injection (CVE-2012-2695)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source\u0026output=gplain"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-06-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-09-07T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "SUSE-SU-2012:1012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
        },
        {
          "name": "openSUSE-SU-2012:0978",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
        },
        {
          "name": "SUSE-SU-2012:1014",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
        },
        {
          "name": "openSUSE-SU-2012:1066",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        },
        {
          "name": "[rubyonrails-security] 20120612 Ruby on Rails SQL Injection (CVE-2012-2695)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source\u0026output=gplain"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-2695",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2012:1012",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
            },
            {
              "name": "openSUSE-SU-2012:0978",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
            },
            {
              "name": "SUSE-SU-2012:1014",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
            },
            {
              "name": "openSUSE-SU-2012:1066",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
            },
            {
              "name": "RHSA-2013:0154",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
            },
            {
              "name": "[rubyonrails-security] 20120612 Ruby on Rails SQL Injection (CVE-2012-2695)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source\u0026output=gplain"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2695",
    "datePublished": "2012-06-22T14:00:00",
    "dateReserved": "2012-05-14T00:00:00",
    "dateUpdated": "2024-08-06T19:42:31.701Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-3463
Vulnerability from cvelistv5
Published
2012-08-10 10:00
Modified
2024-08-06 20:05
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the prompt field to the select_tag helper.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:05:12.614Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
          },
          {
            "name": "[rubyonrails-security] 20120810 Ruby on Rails Potential XSS Vulnerability in select_tag prompt",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source\u0026output=gplain"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the prompt field to the select_tag helper."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
        },
        {
          "name": "[rubyonrails-security] 20120810 Ruby on Rails Potential XSS Vulnerability in select_tag prompt",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source\u0026output=gplain"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-3463",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the prompt field to the select_tag helper."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
            },
            {
              "name": "[rubyonrails-security] 20120810 Ruby on Rails Potential XSS Vulnerability in select_tag prompt",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source\u0026output=gplain"
            },
            {
              "name": "RHSA-2013:0154",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-3463",
    "datePublished": "2012-08-10T10:00:00",
    "dateReserved": "2012-06-14T00:00:00",
    "dateUpdated": "2024-08-06T20:05:12.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-0155
Vulnerability from cvelistv5
Published
2013-01-13 22:00
Modified
2024-08-06 14:18
Severity ?
Summary
Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:18:09.462Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2013:1906",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
          },
          {
            "name": "RHSA-2013:0155",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
          },
          {
            "name": "DSA-2609",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2609"
          },
          {
            "name": "openSUSE-SU-2014:0009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2013-0155"
          },
          {
            "name": "openSUSE-SU-2013:1907",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5784"
          },
          {
            "name": "APPLE-SA-2013-06-04-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
          },
          {
            "name": "openSUSE-SU-2013:1904",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          },
          {
            "name": "[rubyonrails-security] 20130108 Unsafe Query Generation Risk in Ruby on Rails (CVE-2013-0155)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source\u0026output=gplain"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-01-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain \"[nil]\" values, a related issue to CVE-2012-2660 and CVE-2012-2694."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "openSUSE-SU-2013:1906",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
        },
        {
          "name": "RHSA-2013:0155",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
        },
        {
          "name": "DSA-2609",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2609"
        },
        {
          "name": "openSUSE-SU-2014:0009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2013-0155"
        },
        {
          "name": "openSUSE-SU-2013:1907",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5784"
        },
        {
          "name": "APPLE-SA-2013-06-04-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
        },
        {
          "name": "openSUSE-SU-2013:1904",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        },
        {
          "name": "[rubyonrails-security] 20130108 Unsafe Query Generation Risk in Ruby on Rails (CVE-2013-0155)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source\u0026output=gplain"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-0155",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain \"[nil]\" values, a related issue to CVE-2012-2660 and CVE-2012-2694."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2013:1906",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
            },
            {
              "name": "RHSA-2013:0155",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
            },
            {
              "name": "DSA-2609",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2609"
            },
            {
              "name": "openSUSE-SU-2014:0009",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
            },
            {
              "name": "https://puppet.com/security/cve/cve-2013-0155",
              "refsource": "CONFIRM",
              "url": "https://puppet.com/security/cve/cve-2013-0155"
            },
            {
              "name": "openSUSE-SU-2013:1907",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
            },
            {
              "name": "http://support.apple.com/kb/HT5784",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT5784"
            },
            {
              "name": "APPLE-SA-2013-06-04-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
            },
            {
              "name": "openSUSE-SU-2013:1904",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
            },
            {
              "name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A",
              "refsource": "MISC",
              "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A"
            },
            {
              "name": "RHSA-2013:0154",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
            },
            {
              "name": "[rubyonrails-security] 20130108 Unsafe Query Generation Risk in Ruby on Rails (CVE-2013-0155)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source\u0026output=gplain"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-0155",
    "datePublished": "2013-01-13T22:00:00",
    "dateReserved": "2012-12-06T00:00:00",
    "dateUpdated": "2024-08-06T14:18:09.462Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-3424
Vulnerability from cvelistv5
Published
2012-08-08 10:00
Modified
2024-08-06 20:05
Severity ?
Summary
The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a with_http_digest helper method, as demonstrated by the authenticate_or_request_with_http_digest method.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:05:12.401Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[rubyonrails-security] 20120726 Ruby on Rails DoS Vulnerability in authenticate_or_request_with_http_digest (CVE-2012-3424)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en\u0026dmode=source\u0026output=gplain"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/"
          },
          {
            "name": "openSUSE-SU-2012:1066",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-07-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a with_http_digest helper method, as demonstrated by the authenticate_or_request_with_http_digest method."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-11-06T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[rubyonrails-security] 20120726 Ruby on Rails DoS Vulnerability in authenticate_or_request_with_http_digest (CVE-2012-3424)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en\u0026dmode=source\u0026output=gplain"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/"
        },
        {
          "name": "openSUSE-SU-2012:1066",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-3424",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a with_http_digest helper method, as demonstrated by the authenticate_or_request_with_http_digest method."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[rubyonrails-security] 20120726 Ruby on Rails DoS Vulnerability in authenticate_or_request_with_http_digest (CVE-2012-3424)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en\u0026dmode=source\u0026output=gplain"
            },
            {
              "name": "http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/"
            },
            {
              "name": "openSUSE-SU-2012:1066",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
            },
            {
              "name": "RHSA-2013:0154",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-3424",
    "datePublished": "2012-08-08T10:00:00",
    "dateReserved": "2012-06-14T00:00:00",
    "dateUpdated": "2024-08-06T20:05:12.401Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-0081
Vulnerability from cvelistv5
Published
2014-02-20 11:00
Modified
2024-08-06 09:05
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper.
References
http://rhn.redhat.com/errata/RHSA-2014-0215.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2014-0306.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/65647vdb-entry, x_refsource_BID
http://www.securitytracker.com/id/1029782vdb-entry, x_refsource_SECTRACK
http://openwall.com/lists/oss-security/2014/02/18/8mailing-list, x_refsource_MLIST
http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/57376third-party-advisory, x_refsource_SECUNIA
https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJmailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:05:38.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2014:0215",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
          },
          {
            "name": "RHSA-2014:0306",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
          },
          {
            "name": "65647",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65647"
          },
          {
            "name": "1029782",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1029782"
          },
          {
            "name": "[oss-security] 20140218 XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human (CVE-2014-0081)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2014/02/18/8"
          },
          {
            "name": "openSUSE-SU-2014:0295",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html"
          },
          {
            "name": "57376",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57376"
          },
          {
            "name": "[rubyonrails-security] 20140218 XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human (CVE-2014-0081)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-02-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-06-02T14:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2014:0215",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
        },
        {
          "name": "RHSA-2014:0306",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
        },
        {
          "name": "65647",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65647"
        },
        {
          "name": "1029782",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1029782"
        },
        {
          "name": "[oss-security] 20140218 XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human (CVE-2014-0081)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2014/02/18/8"
        },
        {
          "name": "openSUSE-SU-2014:0295",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html"
        },
        {
          "name": "57376",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57376"
        },
        {
          "name": "[rubyonrails-security] 20140218 XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human (CVE-2014-0081)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2014-0081",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2014:0215",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
            },
            {
              "name": "RHSA-2014:0306",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
            },
            {
              "name": "65647",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65647"
            },
            {
              "name": "1029782",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1029782"
            },
            {
              "name": "[oss-security] 20140218 XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human (CVE-2014-0081)",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2014/02/18/8"
            },
            {
              "name": "openSUSE-SU-2014:0295",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html"
            },
            {
              "name": "57376",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57376"
            },
            {
              "name": "[rubyonrails-security] 20140218 XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human (CVE-2014-0081)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-0081",
    "datePublished": "2014-02-20T11:00:00",
    "dateReserved": "2013-12-03T00:00:00",
    "dateUpdated": "2024-08-06T09:05:38.984Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6077
Vulnerability from cvelistv5
Published
2007-11-21 21:00
Modified
2024-08-07 15:54
Severity ?
Summary
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:54:26.389Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-4238",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4238"
          },
          {
            "name": "TA07-352A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
          },
          {
            "name": "28136",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28136"
          },
          {
            "name": "27781",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27781"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.rubyonrails.org/changeset/8177"
          },
          {
            "name": "APPLE-SA-2007-12-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
          },
          {
            "name": "26598",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26598"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=307179"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.rubyonrails.org/ticket/10048"
          },
          {
            "name": "ADV-2007-4009",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4009"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-11-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks.  NOTE: this is due to an incomplete fix for CVE-2007-5380."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-12-01T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-4238",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4238"
        },
        {
          "name": "TA07-352A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
        },
        {
          "name": "28136",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28136"
        },
        {
          "name": "27781",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27781"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.rubyonrails.org/changeset/8177"
        },
        {
          "name": "APPLE-SA-2007-12-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
        },
        {
          "name": "26598",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26598"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=307179"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.rubyonrails.org/ticket/10048"
        },
        {
          "name": "ADV-2007-4009",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4009"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6077",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks.  NOTE: this is due to an incomplete fix for CVE-2007-5380."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-4238",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4238"
            },
            {
              "name": "TA07-352A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
            },
            {
              "name": "28136",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28136"
            },
            {
              "name": "27781",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27781"
            },
            {
              "name": "http://dev.rubyonrails.org/changeset/8177",
              "refsource": "CONFIRM",
              "url": "http://dev.rubyonrails.org/changeset/8177"
            },
            {
              "name": "APPLE-SA-2007-12-17",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
            },
            {
              "name": "26598",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26598"
            },
            {
              "name": "http://docs.info.apple.com/article.html?artnum=307179",
              "refsource": "CONFIRM",
              "url": "http://docs.info.apple.com/article.html?artnum=307179"
            },
            {
              "name": "http://dev.rubyonrails.org/ticket/10048",
              "refsource": "CONFIRM",
              "url": "http://dev.rubyonrails.org/ticket/10048"
            },
            {
              "name": "ADV-2007-4009",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4009"
            },
            {
              "name": "http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6077",
    "datePublished": "2007-11-21T21:00:00",
    "dateReserved": "2007-11-21T00:00:00",
    "dateUpdated": "2024-08-07T15:54:26.389Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2929
Vulnerability from cvelistv5
Published
2011-08-29 18:00
Modified
2024-08-06 23:15
Severity ?
Summary
The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:32.016Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
          },
          {
            "name": "FEDORA-2011-11386",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
          },
          {
            "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
          },
          {
            "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
          },
          {
            "name": "FEDORA-2011-11572",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
          },
          {
            "name": "[rubyonrails-security] 20110816 Filter Skipping Vulnerability in Ruby on Rails 3.0",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source\u0026output=gplain"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731432"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a \"filter skipping vulnerability.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-23T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
        },
        {
          "name": "FEDORA-2011-11386",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
        },
        {
          "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
        },
        {
          "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
        },
        {
          "name": "FEDORA-2011-11572",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
        },
        {
          "name": "[rubyonrails-security] 20110816 Filter Skipping Vulnerability in Ruby on Rails 3.0",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source\u0026output=gplain"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731432"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-2929",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a \"filter skipping vulnerability.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
            },
            {
              "name": "FEDORA-2011-11386",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
            },
            {
              "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
            },
            {
              "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
            },
            {
              "name": "FEDORA-2011-11572",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
            },
            {
              "name": "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552",
              "refsource": "CONFIRM",
              "url": "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
            },
            {
              "name": "[rubyonrails-security] 20110816 Filter Skipping Vulnerability in Ruby on Rails 3.0",
              "refsource": "MLIST",
              "url": "http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source\u0026output=gplain"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
            },
            {
              "name": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=731432",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731432"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2929",
    "datePublished": "2011-08-29T18:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:32.016Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-4319
Vulnerability from cvelistv5
Published
2011-11-28 11:00
Modified
2024-08-07 00:01
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an "html" substring.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:51.607Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "77199",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/77199"
          },
          {
            "name": "[oss-security] 20111118 Re: CVE Request -- Ruby on Rails / rubygem-actionpack -- XSS in the \u0027translate\u0027 helper method",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/11/18/8"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1"
          },
          {
            "name": "[rubyonrails-security] 20111118 XSS vulnerability in the translate helper method in Ruby on Rails",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source\u0026output=gplain"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released"
          },
          {
            "name": "1026342",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026342"
          },
          {
            "name": "rubyonrails-translatehelper-xss(71364)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71364"
          },
          {
            "name": "50722",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/50722"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an \"html\" substring."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "77199",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/77199"
        },
        {
          "name": "[oss-security] 20111118 Re: CVE Request -- Ruby on Rails / rubygem-actionpack -- XSS in the \u0027translate\u0027 helper method",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/11/18/8"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1"
        },
        {
          "name": "[rubyonrails-security] 20111118 XSS vulnerability in the translate helper method in Ruby on Rails",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source\u0026output=gplain"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released"
        },
        {
          "name": "1026342",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026342"
        },
        {
          "name": "rubyonrails-translatehelper-xss(71364)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71364"
        },
        {
          "name": "50722",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/50722"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-4319",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an \"html\" substring."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "77199",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/77199"
            },
            {
              "name": "[oss-security] 20111118 Re: CVE Request -- Ruby on Rails / rubygem-actionpack -- XSS in the \u0027translate\u0027 helper method",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/11/18/8"
            },
            {
              "name": "http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released"
            },
            {
              "name": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1",
              "refsource": "CONFIRM",
              "url": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1"
            },
            {
              "name": "[rubyonrails-security] 20111118 XSS vulnerability in the translate helper method in Ruby on Rails",
              "refsource": "MLIST",
              "url": "http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source\u0026output=gplain"
            },
            {
              "name": "http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released"
            },
            {
              "name": "1026342",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026342"
            },
            {
              "name": "rubyonrails-translatehelper-xss(71364)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71364"
            },
            {
              "name": "50722",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/50722"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-4319",
    "datePublished": "2011-11-28T11:00:00",
    "dateReserved": "2011-11-04T00:00:00",
    "dateUpdated": "2024-08-07T00:01:51.607Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-0277
Vulnerability from cvelistv5
Published
2013-02-13 01:00
Modified
2024-08-06 14:18
Severity ?
Summary
ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:18:09.560Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1028109",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1028109"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2013-0277"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5784"
          },
          {
            "name": "DSA-2620",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2620"
          },
          {
            "name": "APPLE-SA-2013-06-04-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
          },
          {
            "name": "90073",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/90073"
          },
          {
            "name": "[rubyonrails-security] 20130211 Serialized Attributes YAML Vulnerability with Rails 2.3 and 3.0 [CVE-2013-0277]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source\u0026output=gplain"
          },
          {
            "name": "openSUSE-SU-2013:0462",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html"
          },
          {
            "name": "[oss-security] 20130211 Serialized Attributes YAML Vulnerability with Rails 2.3 and 3.0 [CVE-2013-0277]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/02/11/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/"
          },
          {
            "name": "52112",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/52112"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "1028109",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1028109"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2013-0277"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5784"
        },
        {
          "name": "DSA-2620",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2620"
        },
        {
          "name": "APPLE-SA-2013-06-04-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
        },
        {
          "name": "90073",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/90073"
        },
        {
          "name": "[rubyonrails-security] 20130211 Serialized Attributes YAML Vulnerability with Rails 2.3 and 3.0 [CVE-2013-0277]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source\u0026output=gplain"
        },
        {
          "name": "openSUSE-SU-2013:0462",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html"
        },
        {
          "name": "[oss-security] 20130211 Serialized Attributes YAML Vulnerability with Rails 2.3 and 3.0 [CVE-2013-0277]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/02/11/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/"
        },
        {
          "name": "52112",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/52112"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-0277",
    "datePublished": "2013-02-13T01:00:00",
    "dateReserved": "2012-12-06T00:00:00",
    "dateUpdated": "2024-08-06T14:18:09.560Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-0751
Vulnerability from cvelistv5
Published
2016-02-16 02:00
Modified
2024-08-05 22:30
Severity ?
Summary
actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:30:03.975Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2016:0372",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
          },
          {
            "name": "openSUSE-SU-2016:0363",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
          },
          {
            "name": "FEDORA-2016-94e71ee673",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"
          },
          {
            "name": "[ruby-security-ann] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ"
          },
          {
            "name": "FEDORA-2016-f486068393",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"
          },
          {
            "name": "SUSE-SU-2016:1146",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
          },
          {
            "name": "81800",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/81800"
          },
          {
            "name": "1034816",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1034816"
          },
          {
            "name": "[oss-security] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/01/25/9"
          },
          {
            "name": "DSA-3464",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3464"
          },
          {
            "name": "RHSA-2016:0296",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-09T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "openSUSE-SU-2016:0372",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
        },
        {
          "name": "openSUSE-SU-2016:0363",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
        },
        {
          "name": "FEDORA-2016-94e71ee673",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"
        },
        {
          "name": "[ruby-security-ann] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ"
        },
        {
          "name": "FEDORA-2016-f486068393",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"
        },
        {
          "name": "SUSE-SU-2016:1146",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
        },
        {
          "name": "81800",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/81800"
        },
        {
          "name": "1034816",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1034816"
        },
        {
          "name": "[oss-security] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/01/25/9"
        },
        {
          "name": "DSA-3464",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3464"
        },
        {
          "name": "RHSA-2016:0296",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2016-0751",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2016:0372",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
            },
            {
              "name": "openSUSE-SU-2016:0363",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
            },
            {
              "name": "FEDORA-2016-94e71ee673",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"
            },
            {
              "name": "[ruby-security-ann] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ"
            },
            {
              "name": "FEDORA-2016-f486068393",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"
            },
            {
              "name": "SUSE-SU-2016:1146",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
            },
            {
              "name": "81800",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/81800"
            },
            {
              "name": "1034816",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1034816"
            },
            {
              "name": "[oss-security] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/01/25/9"
            },
            {
              "name": "DSA-3464",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3464"
            },
            {
              "name": "RHSA-2016:0296",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-0751",
    "datePublished": "2016-02-16T02:00:00",
    "dateReserved": "2015-12-16T00:00:00",
    "dateUpdated": "2024-08-05T22:30:03.975Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6417
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:39
Severity ?
Summary
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:39:01.423Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2014:0008",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
          },
          {
            "name": "openSUSE-SU-2013:1906",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
          },
          {
            "name": "RHSA-2014:0469",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
          },
          {
            "name": "[ruby-security-ann] 20131203 [CVE-2013-6417] Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ"
          },
          {
            "name": "openSUSE-SU-2014:0009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
          },
          {
            "name": "openSUSE-SU-2013:1907",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
          },
          {
            "name": "openSUSE-SU-2013:1904",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
          },
          {
            "name": "RHSA-2013:1794",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2013-6417"
          },
          {
            "name": "DSA-2888",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2888"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2014:0008",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
        },
        {
          "name": "openSUSE-SU-2013:1906",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
        },
        {
          "name": "RHSA-2014:0469",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
        },
        {
          "name": "[ruby-security-ann] 20131203 [CVE-2013-6417] Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ"
        },
        {
          "name": "openSUSE-SU-2014:0009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
        },
        {
          "name": "openSUSE-SU-2013:1907",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
        },
        {
          "name": "openSUSE-SU-2013:1904",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
        },
        {
          "name": "RHSA-2013:1794",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2013-6417"
        },
        {
          "name": "DSA-2888",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2888"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-6417",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2014:0008",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
            },
            {
              "name": "openSUSE-SU-2013:1906",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
            },
            {
              "name": "RHSA-2014:0469",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
            },
            {
              "name": "[ruby-security-ann] 20131203 [CVE-2013-6417] Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ"
            },
            {
              "name": "openSUSE-SU-2014:0009",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
            },
            {
              "name": "openSUSE-SU-2013:1907",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
            },
            {
              "name": "openSUSE-SU-2013:1904",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
            },
            {
              "name": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
            },
            {
              "name": "RHSA-2013:1794",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
            },
            {
              "name": "https://puppet.com/security/cve/cve-2013-6417",
              "refsource": "CONFIRM",
              "url": "https://puppet.com/security/cve/cve-2013-6417"
            },
            {
              "name": "DSA-2888",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2888"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-6417",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-11-04T00:00:00",
    "dateUpdated": "2024-08-06T17:39:01.423Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-1854
Vulnerability from cvelistv5
Published
2013-03-19 22:00
Modified
2024-08-06 15:20
Severity ?
Summary
The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:36.703Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2013:0667",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html"
          },
          {
            "name": "APPLE-SA-2013-10-22-5",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
          },
          {
            "name": "openSUSE-SU-2013:0659",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html"
          },
          {
            "name": "openSUSE-SU-2013:0660",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5784"
          },
          {
            "name": "APPLE-SA-2013-06-04-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
          },
          {
            "name": "RHSA-2014:1863",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
          },
          {
            "name": "openSUSE-SU-2013:0664",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html"
          },
          {
            "name": "openSUSE-SU-2013:0668",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html"
          },
          {
            "name": "[ruby-security-ann] 20130318 [CVE-2013-1854] Symbol DoS vulnerability in Active Record",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source\u0026output=gplain"
          },
          {
            "name": "RHSA-2013:0699",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0699.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-12-09T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "openSUSE-SU-2013:0667",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html"
        },
        {
          "name": "APPLE-SA-2013-10-22-5",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
        },
        {
          "name": "openSUSE-SU-2013:0659",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html"
        },
        {
          "name": "openSUSE-SU-2013:0660",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5784"
        },
        {
          "name": "APPLE-SA-2013-06-04-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
        },
        {
          "name": "RHSA-2014:1863",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
        },
        {
          "name": "openSUSE-SU-2013:0664",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html"
        },
        {
          "name": "openSUSE-SU-2013:0668",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html"
        },
        {
          "name": "[ruby-security-ann] 20130318 [CVE-2013-1854] Symbol DoS vulnerability in Active Record",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source\u0026output=gplain"
        },
        {
          "name": "RHSA-2013:0699",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0699.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-1854",
    "datePublished": "2013-03-19T22:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:36.703Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-6496
Vulnerability from cvelistv5
Published
2013-01-04 02:00
Modified
2024-08-06 21:28
Severity ?
Summary
SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:28:39.807Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889649"
          },
          {
            "name": "RHSA-2013:0155",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/"
          },
          {
            "name": "RHSA-2013:0220",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
          },
          {
            "name": "GLSA-201401-22",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201401-22.xml"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          },
          {
            "name": "[rubyonrails-security] 20130102 SQL Injection Vulnerability in Ruby on Rails (CVE-2012-5664)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source\u0026output=gplain"
          },
          {
            "name": "57084",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/57084"
          },
          {
            "name": "RHSA-2013:0544",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-12-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-06T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889649"
        },
        {
          "name": "RHSA-2013:0155",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/"
        },
        {
          "name": "RHSA-2013:0220",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
        },
        {
          "name": "GLSA-201401-22",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201401-22.xml"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        },
        {
          "name": "[rubyonrails-security] 20130102 SQL Injection Vulnerability in Ruby on Rails (CVE-2012-5664)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source\u0026output=gplain"
        },
        {
          "name": "57084",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/57084"
        },
        {
          "name": "RHSA-2013:0544",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-6496",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=889649",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889649"
            },
            {
              "name": "RHSA-2013:0155",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
            },
            {
              "name": "http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/",
              "refsource": "MISC",
              "url": "http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/"
            },
            {
              "name": "RHSA-2013:0220",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
            },
            {
              "name": "GLSA-201401-22",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201401-22.xml"
            },
            {
              "name": "RHSA-2013:0154",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
            },
            {
              "name": "[rubyonrails-security] 20130102 SQL Injection Vulnerability in Ruby on Rails (CVE-2012-5664)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source\u0026output=gplain"
            },
            {
              "name": "57084",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/57084"
            },
            {
              "name": "RHSA-2013:0544",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-6496",
    "datePublished": "2013-01-04T02:00:00",
    "dateReserved": "2013-01-03T00:00:00",
    "dateUpdated": "2024-08-06T21:28:39.807Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7818
Vulnerability from cvelistv5
Published
2014-11-08 11:00
Modified
2024-08-06 13:03
Severity ?
Summary
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.154Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2014-7829"
          },
          {
            "name": "openSUSE-SU-2014:1515",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html"
          },
          {
            "name": "[rubyonrails-security] 20141030 Arbitrary file existence disclosure in Action Pack (CVE-2014-7818)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-10-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2014-7829"
        },
        {
          "name": "openSUSE-SU-2014:1515",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html"
        },
        {
          "name": "[rubyonrails-security] 20141030 Arbitrary file existence disclosure in Action Pack (CVE-2014-7818)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2014-7818",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://puppet.com/security/cve/cve-2014-7829",
              "refsource": "CONFIRM",
              "url": "https://puppet.com/security/cve/cve-2014-7829"
            },
            {
              "name": "openSUSE-SU-2014:1515",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html"
            },
            {
              "name": "[rubyonrails-security] 20141030 Arbitrary file existence disclosure in Action Pack (CVE-2014-7818)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-7818",
    "datePublished": "2014-11-08T11:00:00",
    "dateReserved": "2014-10-03T00:00:00",
    "dateUpdated": "2024-08-06T13:03:27.154Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-2098
Vulnerability from cvelistv5
Published
2016-04-07 23:00
Modified
2024-08-05 23:17
Severity ?
Summary
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:17:50.698Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2016:0867",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html"
          },
          {
            "name": "SUSE-SU-2016:0967",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html"
          },
          {
            "name": "DSA-3509",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3509"
          },
          {
            "name": "83725",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/83725"
          },
          {
            "name": "1035122",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035122"
          },
          {
            "name": "40086",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/40086/"
          },
          {
            "name": "SUSE-SU-2016:0854",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html"
          },
          {
            "name": "openSUSE-SU-2016:0790",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html"
          },
          {
            "name": "SUSE-SU-2016:1146",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
          },
          {
            "name": "openSUSE-SU-2016:0835",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html"
          },
          {
            "name": "[ruby-security-ann] 20160229 [CVE-2016-2098] Possible remote code execution vulnerability in Action Pack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-02-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application\u0027s unrestricted use of the render method."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-02T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "SUSE-SU-2016:0867",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html"
        },
        {
          "name": "SUSE-SU-2016:0967",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html"
        },
        {
          "name": "DSA-3509",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3509"
        },
        {
          "name": "83725",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/83725"
        },
        {
          "name": "1035122",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035122"
        },
        {
          "name": "40086",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/40086/"
        },
        {
          "name": "SUSE-SU-2016:0854",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html"
        },
        {
          "name": "openSUSE-SU-2016:0790",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html"
        },
        {
          "name": "SUSE-SU-2016:1146",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
        },
        {
          "name": "openSUSE-SU-2016:0835",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html"
        },
        {
          "name": "[ruby-security-ann] 20160229 [CVE-2016-2098] Possible remote code execution vulnerability in Action Pack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2016-2098",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application\u0027s unrestricted use of the render method."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2016:0867",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html"
            },
            {
              "name": "SUSE-SU-2016:0967",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html"
            },
            {
              "name": "DSA-3509",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3509"
            },
            {
              "name": "83725",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/83725"
            },
            {
              "name": "1035122",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035122"
            },
            {
              "name": "40086",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/40086/"
            },
            {
              "name": "SUSE-SU-2016:0854",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html"
            },
            {
              "name": "openSUSE-SU-2016:0790",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html"
            },
            {
              "name": "SUSE-SU-2016:1146",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
            },
            {
              "name": "openSUSE-SU-2016:0835",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html"
            },
            {
              "name": "[ruby-security-ann] 20160229 [CVE-2016-2098] Possible remote code execution vulnerability in Action Pack",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ"
            },
            {
              "name": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-2098",
    "datePublished": "2016-04-07T23:00:00",
    "dateReserved": "2016-01-29T00:00:00",
    "dateUpdated": "2024-08-05T23:17:50.698Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-2097
Vulnerability from cvelistv5
Published
2016-04-07 23:00
Modified
2024-08-05 23:17
Severity ?
Summary
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:17:50.576Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2016:0967",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html"
          },
          {
            "name": "DSA-3509",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3509"
          },
          {
            "name": "[ruby-security-ann] 20160229 [CVE-2016-0752] Possible Information Leak Vulnerability in Action View",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ"
          },
          {
            "name": "1035122",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035122"
          },
          {
            "name": "SUSE-SU-2016:0854",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html"
          },
          {
            "name": "83726",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/83726"
          },
          {
            "name": "openSUSE-SU-2016:0835",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-02-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application\u0027s unrestricted use of the render method and providing a .. (dot dot) in a pathname.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-30T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "SUSE-SU-2016:0967",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html"
        },
        {
          "name": "DSA-3509",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3509"
        },
        {
          "name": "[ruby-security-ann] 20160229 [CVE-2016-0752] Possible Information Leak Vulnerability in Action View",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ"
        },
        {
          "name": "1035122",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035122"
        },
        {
          "name": "SUSE-SU-2016:0854",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html"
        },
        {
          "name": "83726",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/83726"
        },
        {
          "name": "openSUSE-SU-2016:0835",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2016-2097",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application\u0027s unrestricted use of the render method and providing a .. (dot dot) in a pathname.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2016:0967",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html"
            },
            {
              "name": "DSA-3509",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3509"
            },
            {
              "name": "[ruby-security-ann] 20160229 [CVE-2016-0752] Possible Information Leak Vulnerability in Action View",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ"
            },
            {
              "name": "1035122",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035122"
            },
            {
              "name": "SUSE-SU-2016:0854",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html"
            },
            {
              "name": "83726",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/83726"
            },
            {
              "name": "openSUSE-SU-2016:0835",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html"
            },
            {
              "name": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-2097",
    "datePublished": "2016-04-07T23:00:00",
    "dateReserved": "2016-01-29T00:00:00",
    "dateUpdated": "2024-08-05T23:17:50.576Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-7576
Vulnerability from cvelistv5
Published
2016-02-16 02:00
Modified
2024-08-06 07:51
Severity ?
Summary
The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T07:51:28.554Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20160125 [CVE-2015-7576] Timing attack vulnerability in basic authentication in Action Controller.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/01/25/8"
          },
          {
            "name": "FEDORA-2016-3ede04cd79",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html"
          },
          {
            "name": "openSUSE-SU-2016:0372",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
          },
          {
            "name": "openSUSE-SU-2016:0363",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
          },
          {
            "name": "FEDORA-2016-94e71ee673",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"
          },
          {
            "name": "81803",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/81803"
          },
          {
            "name": "FEDORA-2016-f486068393",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"
          },
          {
            "name": "SUSE-SU-2016:1146",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
          },
          {
            "name": "1034816",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1034816"
          },
          {
            "name": "DSA-3464",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3464"
          },
          {
            "name": "RHSA-2016:0296",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
          },
          {
            "name": "FEDORA-2016-cb30088b06",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html"
          },
          {
            "name": "[ruby-security-ann] 20160125 [CVE-2015-7576] Timing attack vulnerability in basic authentication in Action Controller.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-09T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20160125 [CVE-2015-7576] Timing attack vulnerability in basic authentication in Action Controller.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/01/25/8"
        },
        {
          "name": "FEDORA-2016-3ede04cd79",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html"
        },
        {
          "name": "openSUSE-SU-2016:0372",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
        },
        {
          "name": "openSUSE-SU-2016:0363",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
        },
        {
          "name": "FEDORA-2016-94e71ee673",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"
        },
        {
          "name": "81803",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/81803"
        },
        {
          "name": "FEDORA-2016-f486068393",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"
        },
        {
          "name": "SUSE-SU-2016:1146",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
        },
        {
          "name": "1034816",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1034816"
        },
        {
          "name": "DSA-3464",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3464"
        },
        {
          "name": "RHSA-2016:0296",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
        },
        {
          "name": "FEDORA-2016-cb30088b06",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html"
        },
        {
          "name": "[ruby-security-ann] 20160125 [CVE-2015-7576] Timing attack vulnerability in basic authentication in Action Controller.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2015-7576",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20160125 [CVE-2015-7576] Timing attack vulnerability in basic authentication in Action Controller.",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/01/25/8"
            },
            {
              "name": "FEDORA-2016-3ede04cd79",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html"
            },
            {
              "name": "openSUSE-SU-2016:0372",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
            },
            {
              "name": "openSUSE-SU-2016:0363",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
            },
            {
              "name": "FEDORA-2016-94e71ee673",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"
            },
            {
              "name": "81803",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/81803"
            },
            {
              "name": "FEDORA-2016-f486068393",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"
            },
            {
              "name": "SUSE-SU-2016:1146",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
            },
            {
              "name": "1034816",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1034816"
            },
            {
              "name": "DSA-3464",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3464"
            },
            {
              "name": "RHSA-2016:0296",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
            },
            {
              "name": "FEDORA-2016-cb30088b06",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html"
            },
            {
              "name": "[ruby-security-ann] 20160125 [CVE-2015-7576] Timing attack vulnerability in basic authentication in Action Controller.",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2015-7576",
    "datePublished": "2016-02-16T02:00:00",
    "dateReserved": "2015-09-29T00:00:00",
    "dateUpdated": "2024-08-06T07:51:28.554Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-7577
Vulnerability from cvelistv5
Published
2016-02-16 02:00
Modified
2024-08-06 07:51
Severity ?
Summary
activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T07:51:28.528Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2016:0372",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
          },
          {
            "name": "openSUSE-SU-2016:0363",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
          },
          {
            "name": "FEDORA-2016-73fe05d878",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html"
          },
          {
            "name": "FEDORA-2016-cc465a34df",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html"
          },
          {
            "name": "SUSE-SU-2016:1146",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
          },
          {
            "name": "[ruby-security-ann] 20160125 [CVE-2015-7577] Nested attributes rejection proc bypass in Active Record.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/cawsWcQ6c8g/LATIsglZEgAJ"
          },
          {
            "name": "1034816",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1034816"
          },
          {
            "name": "81806",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/81806"
          },
          {
            "name": "DSA-3464",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3464"
          },
          {
            "name": "RHSA-2016:0296",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
          },
          {
            "name": "[oss-security] 20160125 [CVE-2015-7577] Nested attributes rejection proc bypass in Active Record.",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/01/25/10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-09T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "openSUSE-SU-2016:0372",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
        },
        {
          "name": "openSUSE-SU-2016:0363",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
        },
        {
          "name": "FEDORA-2016-73fe05d878",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html"
        },
        {
          "name": "FEDORA-2016-cc465a34df",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html"
        },
        {
          "name": "SUSE-SU-2016:1146",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
        },
        {
          "name": "[ruby-security-ann] 20160125 [CVE-2015-7577] Nested attributes rejection proc bypass in Active Record.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/cawsWcQ6c8g/LATIsglZEgAJ"
        },
        {
          "name": "1034816",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1034816"
        },
        {
          "name": "81806",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/81806"
        },
        {
          "name": "DSA-3464",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3464"
        },
        {
          "name": "RHSA-2016:0296",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
        },
        {
          "name": "[oss-security] 20160125 [CVE-2015-7577] Nested attributes rejection proc bypass in Active Record.",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/01/25/10"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2015-7577",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2016:0372",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
            },
            {
              "name": "openSUSE-SU-2016:0363",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
            },
            {
              "name": "FEDORA-2016-73fe05d878",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html"
            },
            {
              "name": "FEDORA-2016-cc465a34df",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html"
            },
            {
              "name": "SUSE-SU-2016:1146",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
            },
            {
              "name": "[ruby-security-ann] 20160125 [CVE-2015-7577] Nested attributes rejection proc bypass in Active Record.",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/cawsWcQ6c8g/LATIsglZEgAJ"
            },
            {
              "name": "1034816",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1034816"
            },
            {
              "name": "81806",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/81806"
            },
            {
              "name": "DSA-3464",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3464"
            },
            {
              "name": "RHSA-2016:0296",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
            },
            {
              "name": "[oss-security] 20160125 [CVE-2015-7577] Nested attributes rejection proc bypass in Active Record.",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/01/25/10"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2015-7577",
    "datePublished": "2016-02-16T02:00:00",
    "dateReserved": "2015-09-29T00:00:00",
    "dateUpdated": "2024-08-06T07:51:28.528Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2694
Vulnerability from cvelistv5
Published
2012-06-22 14:00
Modified
2024-08-06 19:42
Severity ?
Summary
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "['xyz', nil]" values, a related issue to CVE-2012-2660.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:31.516Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SU-2012:1015",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html"
          },
          {
            "name": "SUSE-SU-2012:1012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
          },
          {
            "name": "openSUSE-SU-2012:0978",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
          },
          {
            "name": "SUSE-SU-2012:1014",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
          },
          {
            "name": "openSUSE-SU-2012:1066",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
          },
          {
            "name": "[rubyonrails-security] 20120612 Ruby on Rails Unsafe Query Generation Risk in Ruby on Rails (CVE-2012-2694)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source\u0026output=gplain"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-06-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain \"[\u0027xyz\u0027, nil]\" values, a related issue to CVE-2012-2660."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-09-07T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "SUSE-SU-2012:1015",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html"
        },
        {
          "name": "SUSE-SU-2012:1012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
        },
        {
          "name": "openSUSE-SU-2012:0978",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
        },
        {
          "name": "SUSE-SU-2012:1014",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
        },
        {
          "name": "openSUSE-SU-2012:1066",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
        },
        {
          "name": "[rubyonrails-security] 20120612 Ruby on Rails Unsafe Query Generation Risk in Ruby on Rails (CVE-2012-2694)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source\u0026output=gplain"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-2694",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain \"[\u0027xyz\u0027, nil]\" values, a related issue to CVE-2012-2660."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SU-2012:1015",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html"
            },
            {
              "name": "SUSE-SU-2012:1012",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
            },
            {
              "name": "openSUSE-SU-2012:0978",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html"
            },
            {
              "name": "SUSE-SU-2012:1014",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
            },
            {
              "name": "openSUSE-SU-2012:1066",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
            },
            {
              "name": "[rubyonrails-security] 20120612 Ruby on Rails Unsafe Query Generation Risk in Ruby on Rails (CVE-2012-2694)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source\u0026output=gplain"
            },
            {
              "name": "RHSA-2013:0154",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2694",
    "datePublished": "2012-06-22T14:00:00",
    "dateReserved": "2012-05-14T00:00:00",
    "dateUpdated": "2024-08-06T19:42:31.516Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2930
Vulnerability from cvelistv5
Published
2011-08-29 18:00
Modified
2024-08-06 23:15
Severity ?
Summary
Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.901Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
          },
          {
            "name": "FEDORA-2011-11386",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
          },
          {
            "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
          },
          {
            "name": "DSA-2301",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2301"
          },
          {
            "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
          },
          {
            "name": "[rubyonrails-security] 20110816 SQL Injection Vulnerability in quote_table_name",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source\u0026output=gplain"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731438"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-23T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
        },
        {
          "name": "FEDORA-2011-11386",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
        },
        {
          "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
        },
        {
          "name": "DSA-2301",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2301"
        },
        {
          "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
        },
        {
          "name": "[rubyonrails-security] 20110816 SQL Injection Vulnerability in quote_table_name",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source\u0026output=gplain"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731438"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-2930",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
            },
            {
              "name": "https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85",
              "refsource": "CONFIRM",
              "url": "https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
            },
            {
              "name": "FEDORA-2011-11386",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
            },
            {
              "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
            },
            {
              "name": "DSA-2301",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2301"
            },
            {
              "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
            },
            {
              "name": "[rubyonrails-security] 20110816 SQL Injection Vulnerability in quote_table_name",
              "refsource": "MLIST",
              "url": "http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source\u0026output=gplain"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=731438",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731438"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
            },
            {
              "name": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2930",
    "datePublished": "2011-08-29T18:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.901Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-3482
Vulnerability from cvelistv5
Published
2014-07-07 10:00
Modified
2024-08-06 10:43
Severity ?
Summary
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting.
References
http://www.securityfocus.com/bid/68343vdb-entry, x_refsource_BID
http://secunia.com/advisories/59973third-party-advisory, x_refsource_SECUNIA
http://openwall.com/lists/oss-security/2014/07/02/5mailing-list, x_refsource_MLIST
https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4Jmailing-list, x_refsource_MLIST
http://secunia.com/advisories/60214third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60763third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2014-0876.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2014/dsa-2982vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:43:06.174Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "68343",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/68343"
          },
          {
            "name": "59973",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59973"
          },
          {
            "name": "[oss-security] 20140702 [CVE-2014-3482] [CVE-2014-3483] Ruby on Rails: Two Active Record SQL Injection Vulnerabilities Affecting PostgreSQL",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2014/07/02/5"
          },
          {
            "name": "[rubyonrails-security] 20140702 [CVE-2014-3482] [CVE-2014-3483] Two Active Record SQL Injection Vulnerabilities Affecting PostgreSQL",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J"
          },
          {
            "name": "60214",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/60214"
          },
          {
            "name": "60763",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/60763"
          },
          {
            "name": "RHSA-2014:0876",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0876.html"
          },
          {
            "name": "DSA-2982",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2982"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-07-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-01-04T17:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "68343",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/68343"
        },
        {
          "name": "59973",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59973"
        },
        {
          "name": "[oss-security] 20140702 [CVE-2014-3482] [CVE-2014-3483] Ruby on Rails: Two Active Record SQL Injection Vulnerabilities Affecting PostgreSQL",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2014/07/02/5"
        },
        {
          "name": "[rubyonrails-security] 20140702 [CVE-2014-3482] [CVE-2014-3483] Two Active Record SQL Injection Vulnerabilities Affecting PostgreSQL",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J"
        },
        {
          "name": "60214",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/60214"
        },
        {
          "name": "60763",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/60763"
        },
        {
          "name": "RHSA-2014:0876",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0876.html"
        },
        {
          "name": "DSA-2982",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2982"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2014-3482",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "68343",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/68343"
            },
            {
              "name": "59973",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59973"
            },
            {
              "name": "[oss-security] 20140702 [CVE-2014-3482] [CVE-2014-3483] Ruby on Rails: Two Active Record SQL Injection Vulnerabilities Affecting PostgreSQL",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2014/07/02/5"
            },
            {
              "name": "[rubyonrails-security] 20140702 [CVE-2014-3482] [CVE-2014-3483] Two Active Record SQL Injection Vulnerabilities Affecting PostgreSQL",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J"
            },
            {
              "name": "60214",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/60214"
            },
            {
              "name": "60763",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/60763"
            },
            {
              "name": "RHSA-2014:0876",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0876.html"
            },
            {
              "name": "DSA-2982",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2982"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-3482",
    "datePublished": "2014-07-07T10:00:00",
    "dateReserved": "2014-05-14T00:00:00",
    "dateUpdated": "2024-08-06T10:43:06.174Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-4111
Vulnerability from cvelistv5
Published
2006-08-14 21:00
Modified
2024-08-07 18:57
Severity ?
Summary
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:57:45.989Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21466",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21466"
          },
          {
            "name": "21749",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21749"
          },
          {
            "name": "19454",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19454"
          },
          {
            "name": "ADV-2006-3237",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3237"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html"
          },
          {
            "name": "SUSE-SR:2006:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits"
          },
          {
            "name": "GLSA-200608-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml"
          },
          {
            "name": "1016673",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016673"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with \"severe\" or \"serious\" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-08-23T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21466",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21466"
        },
        {
          "name": "21749",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21749"
        },
        {
          "name": "19454",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19454"
        },
        {
          "name": "ADV-2006-3237",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3237"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html"
        },
        {
          "name": "SUSE-SR:2006:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits"
        },
        {
          "name": "GLSA-200608-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml"
        },
        {
          "name": "1016673",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016673"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4111",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with \"severe\" or \"serious\" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21466",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21466"
            },
            {
              "name": "21749",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21749"
            },
            {
              "name": "19454",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19454"
            },
            {
              "name": "ADV-2006-3237",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3237"
            },
            {
              "name": "http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html",
              "refsource": "MISC",
              "url": "http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html"
            },
            {
              "name": "SUSE-SR:2006:021",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
            },
            {
              "name": "http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits"
            },
            {
              "name": "GLSA-200608-20",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml"
            },
            {
              "name": "1016673",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016673"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4111",
    "datePublished": "2006-08-14T21:00:00",
    "dateReserved": "2006-08-14T00:00:00",
    "dateUpdated": "2024-08-07T18:57:45.989Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-1856
Vulnerability from cvelistv5
Published
2013-03-19 22:00
Modified
2024-08-06 15:20
Severity ?
Summary
The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:35.152Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "APPLE-SA-2013-10-22-5",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5784"
          },
          {
            "name": "APPLE-SA-2013-06-04-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
          },
          {
            "name": "[rubyonrails-security] 20130318 [CVE-2013-1856] XML Parsing Vulnerability affecting JRuby users",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source\u0026output=gplain"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-03-22T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "APPLE-SA-2013-10-22-5",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5784"
        },
        {
          "name": "APPLE-SA-2013-06-04-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
        },
        {
          "name": "[rubyonrails-security] 20130318 [CVE-2013-1856] XML Parsing Vulnerability affecting JRuby users",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source\u0026output=gplain"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-1856",
    "datePublished": "2013-03-19T22:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:35.152Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-6316
Vulnerability from cvelistv5
Published
2016-09-07 19:00
Modified
2024-08-06 01:29
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:29:18.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2016:1856",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-1856.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2016-6316"
          },
          {
            "name": "92430",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/92430"
          },
          {
            "name": "RHSA-2016:1855",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-1855.html"
          },
          {
            "name": "[oss-security] 20160811 [CVE-2016-6316] Possible XSS Vulnerability in Action View",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/08/11/3"
          },
          {
            "name": "RHSA-2016:1858",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-1858.html"
          },
          {
            "name": "RHSA-2016:1857",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-1857.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/"
          },
          {
            "name": "[ruby-security-ann] 20160811 [CVE-2016-6316] Possible XSS Vulnerability in Action View",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/#%21topic/ruby-security-ann/8B2iV2tPRSE"
          },
          {
            "name": "DSA-3651",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3651"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-08-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as \"HTML safe\" and used as attribute values in tag handlers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2016:1856",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-1856.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2016-6316"
        },
        {
          "name": "92430",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/92430"
        },
        {
          "name": "RHSA-2016:1855",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-1855.html"
        },
        {
          "name": "[oss-security] 20160811 [CVE-2016-6316] Possible XSS Vulnerability in Action View",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/08/11/3"
        },
        {
          "name": "RHSA-2016:1858",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-1858.html"
        },
        {
          "name": "RHSA-2016:1857",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-1857.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/"
        },
        {
          "name": "[ruby-security-ann] 20160811 [CVE-2016-6316] Possible XSS Vulnerability in Action View",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/#%21topic/ruby-security-ann/8B2iV2tPRSE"
        },
        {
          "name": "DSA-3651",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3651"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2016-6316",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as \"HTML safe\" and used as attribute values in tag handlers."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2016:1856",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-1856.html"
            },
            {
              "name": "https://puppet.com/security/cve/cve-2016-6316",
              "refsource": "CONFIRM",
              "url": "https://puppet.com/security/cve/cve-2016-6316"
            },
            {
              "name": "92430",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/92430"
            },
            {
              "name": "RHSA-2016:1855",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-1855.html"
            },
            {
              "name": "[oss-security] 20160811 [CVE-2016-6316] Possible XSS Vulnerability in Action View",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/08/11/3"
            },
            {
              "name": "RHSA-2016:1858",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-1858.html"
            },
            {
              "name": "RHSA-2016:1857",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-1857.html"
            },
            {
              "name": "http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/"
            },
            {
              "name": "[ruby-security-ann] 20160811 [CVE-2016-6316] Possible XSS Vulnerability in Action View",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE"
            },
            {
              "name": "DSA-3651",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3651"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-6316",
    "datePublished": "2016-09-07T19:00:00",
    "dateReserved": "2016-07-26T00:00:00",
    "dateUpdated": "2024-08-06T01:29:18.216Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-1857
Vulnerability from cvelistv5
Published
2013-03-19 22:00
Modified
2024-08-06 15:20
Severity ?
Summary
The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a : sequence.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:35.190Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "APPLE-SA-2013-10-22-5",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
          },
          {
            "name": "openSUSE-SU-2014:0019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
          },
          {
            "name": "openSUSE-SU-2013:0662",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5784"
          },
          {
            "name": "RHSA-2013:0698",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html"
          },
          {
            "name": "APPLE-SA-2013-06-04-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
          },
          {
            "name": "openSUSE-SU-2013:0661",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"
          },
          {
            "name": "[rubyonrails-security] 20130318 [CVE-2013-1857] XSS Vulnerability in the `sanitize` helper of Ruby on Rails",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source\u0026output=gplain"
          },
          {
            "name": "RHSA-2014:1863",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a \u0026#x3a; sequence."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-12-09T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "APPLE-SA-2013-10-22-5",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
        },
        {
          "name": "openSUSE-SU-2014:0019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
        },
        {
          "name": "openSUSE-SU-2013:0662",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5784"
        },
        {
          "name": "RHSA-2013:0698",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html"
        },
        {
          "name": "APPLE-SA-2013-06-04-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
        },
        {
          "name": "openSUSE-SU-2013:0661",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"
        },
        {
          "name": "[rubyonrails-security] 20130318 [CVE-2013-1857] XSS Vulnerability in the `sanitize` helper of Ruby on Rails",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source\u0026output=gplain"
        },
        {
          "name": "RHSA-2014:1863",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-1857",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a \u0026#x3a; sequence."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "APPLE-SA-2013-10-22-5",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
            },
            {
              "name": "openSUSE-SU-2014:0019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
            },
            {
              "name": "openSUSE-SU-2013:0662",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"
            },
            {
              "name": "http://support.apple.com/kb/HT5784",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT5784"
            },
            {
              "name": "RHSA-2013:0698",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html"
            },
            {
              "name": "APPLE-SA-2013-06-04-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
            },
            {
              "name": "openSUSE-SU-2013:0661",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"
            },
            {
              "name": "[rubyonrails-security] 20130318 [CVE-2013-1857] XSS Vulnerability in the `sanitize` helper of Ruby on Rails",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source\u0026output=gplain"
            },
            {
              "name": "RHSA-2014:1863",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
            },
            {
              "name": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-1857",
    "datePublished": "2013-03-19T22:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:35.190Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-1098
Vulnerability from cvelistv5
Published
2012-03-13 10:00
Modified
2024-08-06 18:45
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:45:27.165Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2012-3321",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html"
          },
          {
            "name": "[oss-security] 20120302 Re: CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799275"
          },
          {
            "name": "[oss-security] 20120302 CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6"
          },
          {
            "name": "[rubyonrails-security] 20120301 Possible XSS Security Vulnerability in SafeBuffer#[]",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source\u0026output=gplain"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2012-3321",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html"
        },
        {
          "name": "[oss-security] 20120302 Re: CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799275"
        },
        {
          "name": "[oss-security] 20120302 CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6"
        },
        {
          "name": "[rubyonrails-security] 20120301 Possible XSS Security Vulnerability in SafeBuffer#[]",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source\u0026output=gplain"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-1098",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2012-3321",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html"
            },
            {
              "name": "[oss-security] 20120302 Re: CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=799275",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799275"
            },
            {
              "name": "[oss-security] 20120302 CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6"
            },
            {
              "name": "[rubyonrails-security] 20120301 Possible XSS Security Vulnerability in SafeBuffer#[]",
              "refsource": "MLIST",
              "url": "http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source\u0026output=gplain"
            },
            {
              "name": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-1098",
    "datePublished": "2012-03-13T10:00:00",
    "dateReserved": "2012-02-14T00:00:00",
    "dateUpdated": "2024-08-06T18:45:27.165Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7829
Vulnerability from cvelistv5
Published
2014-11-18 23:00
Modified
2024-08-06 13:03
Severity ?
Summary
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:26.957Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2014-7829"
          },
          {
            "name": "openSUSE-SU-2014:1515",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html"
          },
          {
            "name": "71183",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/71183"
          },
          {
            "name": "[rubyonrails-security] 20141117 [CVE-2014-7829] Arbitrary file existence disclosure in Action Pack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-11-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \\ (backslash) character, a similar issue to CVE-2014-7818."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2014-7829"
        },
        {
          "name": "openSUSE-SU-2014:1515",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html"
        },
        {
          "name": "71183",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/71183"
        },
        {
          "name": "[rubyonrails-security] 20141117 [CVE-2014-7829] Arbitrary file existence disclosure in Action Pack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2014-7829",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \\ (backslash) character, a similar issue to CVE-2014-7818."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://puppet.com/security/cve/cve-2014-7829",
              "refsource": "CONFIRM",
              "url": "https://puppet.com/security/cve/cve-2014-7829"
            },
            {
              "name": "openSUSE-SU-2014:1515",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html"
            },
            {
              "name": "71183",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/71183"
            },
            {
              "name": "[rubyonrails-security] 20141117 [CVE-2014-7829] Arbitrary file existence disclosure in Action Pack",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-7829",
    "datePublished": "2014-11-18T23:00:00",
    "dateReserved": "2014-10-03T00:00:00",
    "dateUpdated": "2024-08-06T13:03:26.957Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-0156
Vulnerability from cvelistv5
Published
2013-01-13 22:00
Modified
2024-08-06 14:18
Severity ?
Summary
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:18:09.436Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[rubyonrails-security] 20130108 Multiple vulnerabilities in parameter parsing in Action Pack (CVE-2013-0156)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source\u0026output=gplain"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.insinuator.net/2013/01/rails-yaml/"
          },
          {
            "name": "RHSA-2013:0155",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
          },
          {
            "name": "VU#628463",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/628463"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.html"
          },
          {
            "name": "VU#380039",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/380039"
          },
          {
            "name": "APPLE-SA-2013-03-14-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
          },
          {
            "name": "DSA-2604",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2604"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2013-0156"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/"
          },
          {
            "name": "RHSA-2013:0153",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0153.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-01-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[rubyonrails-security] 20130108 Multiple vulnerabilities in parameter parsing in Action Pack (CVE-2013-0156)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source\u0026output=gplain"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.insinuator.net/2013/01/rails-yaml/"
        },
        {
          "name": "RHSA-2013:0155",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0155.html"
        },
        {
          "name": "VU#628463",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/628463"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.html"
        },
        {
          "name": "VU#380039",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/380039"
        },
        {
          "name": "APPLE-SA-2013-03-14-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
        },
        {
          "name": "DSA-2604",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2604"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2013-0156"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/"
        },
        {
          "name": "RHSA-2013:0153",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0153.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-0156",
    "datePublished": "2013-01-13T22:00:00",
    "dateReserved": "2012-12-06T00:00:00",
    "dateUpdated": "2024-08-06T14:18:09.436Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-0752
Vulnerability from cvelistv5
Published
2016-02-16 02:00
Modified
2024-08-05 22:30
Severity ?
Summary
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:30:03.939Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "40561",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/40561/"
          },
          {
            "name": "openSUSE-SU-2016:0372",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
          },
          {
            "name": "openSUSE-SU-2016:0363",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
          },
          {
            "name": "[oss-security] 20160125 [CVE-2016-0752] Possible Information Leak Vulnerability in Action View",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/01/25/13"
          },
          {
            "name": "FEDORA-2016-97002ad37b",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178069.html"
          },
          {
            "name": "SUSE-SU-2016:1146",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
          },
          {
            "name": "81801",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/81801"
          },
          {
            "name": "1034816",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1034816"
          },
          {
            "name": "FEDORA-2016-fa0dec2360",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178044.html"
          },
          {
            "name": "[ruby-security-ann] 20160125 [CVE-2016-0752] Possible Information Leak Vulnerability in Action View",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ"
          },
          {
            "name": "DSA-3464",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3464"
          },
          {
            "name": "RHSA-2016:0296",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application\u0027s unrestricted use of the render method and providing a .. (dot dot) in a pathname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-09T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "40561",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/40561/"
        },
        {
          "name": "openSUSE-SU-2016:0372",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
        },
        {
          "name": "openSUSE-SU-2016:0363",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
        },
        {
          "name": "[oss-security] 20160125 [CVE-2016-0752] Possible Information Leak Vulnerability in Action View",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/01/25/13"
        },
        {
          "name": "FEDORA-2016-97002ad37b",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178069.html"
        },
        {
          "name": "SUSE-SU-2016:1146",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
        },
        {
          "name": "81801",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/81801"
        },
        {
          "name": "1034816",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1034816"
        },
        {
          "name": "FEDORA-2016-fa0dec2360",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178044.html"
        },
        {
          "name": "[ruby-security-ann] 20160125 [CVE-2016-0752] Possible Information Leak Vulnerability in Action View",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ"
        },
        {
          "name": "DSA-3464",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3464"
        },
        {
          "name": "RHSA-2016:0296",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2016-0752",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application\u0027s unrestricted use of the render method and providing a .. (dot dot) in a pathname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "40561",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/40561/"
            },
            {
              "name": "openSUSE-SU-2016:0372",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"
            },
            {
              "name": "openSUSE-SU-2016:0363",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"
            },
            {
              "name": "[oss-security] 20160125 [CVE-2016-0752] Possible Information Leak Vulnerability in Action View",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/01/25/13"
            },
            {
              "name": "FEDORA-2016-97002ad37b",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178069.html"
            },
            {
              "name": "SUSE-SU-2016:1146",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"
            },
            {
              "name": "81801",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/81801"
            },
            {
              "name": "1034816",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1034816"
            },
            {
              "name": "FEDORA-2016-fa0dec2360",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178044.html"
            },
            {
              "name": "[ruby-security-ann] 20160125 [CVE-2016-0752] Possible Information Leak Vulnerability in Action View",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ"
            },
            {
              "name": "DSA-3464",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3464"
            },
            {
              "name": "RHSA-2016:0296",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2016-0296.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-0752",
    "datePublished": "2016-02-16T02:00:00",
    "dateReserved": "2015-12-16T00:00:00",
    "dateUpdated": "2024-08-05T22:30:03.939Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6414
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:39
Severity ?
Summary
actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:39:01.307Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2014:0008",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
          },
          {
            "name": "openSUSE-SU-2013:1906",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
          },
          {
            "name": "57836",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57836"
          },
          {
            "name": "openSUSE-SU-2014:0009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
          },
          {
            "name": "openSUSE-SU-2013:1907",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
          },
          {
            "name": "openSUSE-SU-2013:1904",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2013-6414"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
          },
          {
            "name": "[ruby-security-ann] 20131203 [CVE-2013-6414] Denial of Service Vulnerability in Action View",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ"
          },
          {
            "name": "RHSA-2014:1863",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
          },
          {
            "name": "RHSA-2013:1794",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
          },
          {
            "name": "DSA-2888",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2888"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2014:0008",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
        },
        {
          "name": "openSUSE-SU-2013:1906",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
        },
        {
          "name": "57836",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57836"
        },
        {
          "name": "openSUSE-SU-2014:0009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
        },
        {
          "name": "openSUSE-SU-2013:1907",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
        },
        {
          "name": "openSUSE-SU-2013:1904",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2013-6414"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
        },
        {
          "name": "[ruby-security-ann] 20131203 [CVE-2013-6414] Denial of Service Vulnerability in Action View",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ"
        },
        {
          "name": "RHSA-2014:1863",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
        },
        {
          "name": "RHSA-2013:1794",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
        },
        {
          "name": "DSA-2888",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2888"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-6414",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2014:0008",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
            },
            {
              "name": "openSUSE-SU-2013:1906",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
            },
            {
              "name": "57836",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57836"
            },
            {
              "name": "openSUSE-SU-2014:0009",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
            },
            {
              "name": "openSUSE-SU-2013:1907",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
            },
            {
              "name": "openSUSE-SU-2013:1904",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
            },
            {
              "name": "https://puppet.com/security/cve/cve-2013-6414",
              "refsource": "CONFIRM",
              "url": "https://puppet.com/security/cve/cve-2013-6414"
            },
            {
              "name": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
            },
            {
              "name": "[ruby-security-ann] 20131203 [CVE-2013-6414] Denial of Service Vulnerability in Action View",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ"
            },
            {
              "name": "RHSA-2014:1863",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
            },
            {
              "name": "RHSA-2013:1794",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
            },
            {
              "name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/",
              "refsource": "CONFIRM",
              "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
            },
            {
              "name": "DSA-2888",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2888"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-6414",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-11-04T00:00:00",
    "dateUpdated": "2024-08-06T17:39:01.307Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-3226
Vulnerability from cvelistv5
Published
2015-07-26 22:00
Modified
2024-08-06 05:39
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:39:32.141Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1033755",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033755"
          },
          {
            "name": "[rubyonrails-security] 20150616 [CVE-2015-3226] XSS Vulnerability in ActiveSupport::JSON.encode",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ"
          },
          {
            "name": "75231",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75231"
          },
          {
            "name": "[oss-security] 20150616 [CVE-2015-3226] XSS Vulnerability in ActiveSupport::JSON.encode",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2015/06/16/17"
          },
          {
            "name": "DSA-3464",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2016/dsa-3464"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-06-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-15T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "1033755",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1033755"
        },
        {
          "name": "[rubyonrails-security] 20150616 [CVE-2015-3226] XSS Vulnerability in ActiveSupport::JSON.encode",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ"
        },
        {
          "name": "75231",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75231"
        },
        {
          "name": "[oss-security] 20150616 [CVE-2015-3226] XSS Vulnerability in ActiveSupport::JSON.encode",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2015/06/16/17"
        },
        {
          "name": "DSA-3464",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2016/dsa-3464"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2015-3226",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1033755",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1033755"
            },
            {
              "name": "[rubyonrails-security] 20150616 [CVE-2015-3226] XSS Vulnerability in ActiveSupport::JSON.encode",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ"
            },
            {
              "name": "75231",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75231"
            },
            {
              "name": "[oss-security] 20150616 [CVE-2015-3226] XSS Vulnerability in ActiveSupport::JSON.encode",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2015/06/16/17"
            },
            {
              "name": "DSA-3464",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2016/dsa-3464"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2015-3226",
    "datePublished": "2015-07-26T22:00:00",
    "dateReserved": "2015-04-10T00:00:00",
    "dateUpdated": "2024-08-06T05:39:32.141Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6415
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 17:39
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the number_to_currency helper in actionpack/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:39:01.258Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2014:0008",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
          },
          {
            "name": "openSUSE-SU-2013:1906",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2013-6415"
          },
          {
            "name": "openSUSE-SU-2014:0019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
          },
          {
            "name": "openSUSE-SU-2014:0009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
          },
          {
            "name": "openSUSE-SU-2013:1905",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html"
          },
          {
            "name": "openSUSE-SU-2013:1907",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
          },
          {
            "name": "openSUSE-SU-2013:1904",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
          },
          {
            "name": "[ruby-security-ann] 20131203 [CVE-2013-6415] XSS Vulnerability in number_to_currency",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
          },
          {
            "name": "RHSA-2014:1863",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
          },
          {
            "name": "RHSA-2013:1794",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
          },
          {
            "name": "64077",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/64077"
          },
          {
            "name": "56093",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56093"
          },
          {
            "name": "DSA-2888",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2888"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the number_to_currency helper in actionpack/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2014:0008",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
        },
        {
          "name": "openSUSE-SU-2013:1906",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2013-6415"
        },
        {
          "name": "openSUSE-SU-2014:0019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
        },
        {
          "name": "openSUSE-SU-2014:0009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
        },
        {
          "name": "openSUSE-SU-2013:1905",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html"
        },
        {
          "name": "openSUSE-SU-2013:1907",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
        },
        {
          "name": "openSUSE-SU-2013:1904",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
        },
        {
          "name": "[ruby-security-ann] 20131203 [CVE-2013-6415] XSS Vulnerability in number_to_currency",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
        },
        {
          "name": "RHSA-2014:1863",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
        },
        {
          "name": "RHSA-2013:1794",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
        },
        {
          "name": "64077",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/64077"
        },
        {
          "name": "56093",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56093"
        },
        {
          "name": "DSA-2888",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2888"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-6415",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the number_to_currency helper in actionpack/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2014:0008",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
            },
            {
              "name": "openSUSE-SU-2013:1906",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
            },
            {
              "name": "https://puppet.com/security/cve/cve-2013-6415",
              "refsource": "CONFIRM",
              "url": "https://puppet.com/security/cve/cve-2013-6415"
            },
            {
              "name": "openSUSE-SU-2014:0019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
            },
            {
              "name": "openSUSE-SU-2014:0009",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
            },
            {
              "name": "openSUSE-SU-2013:1905",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html"
            },
            {
              "name": "openSUSE-SU-2013:1907",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
            },
            {
              "name": "openSUSE-SU-2013:1904",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
            },
            {
              "name": "[ruby-security-ann] 20131203 [CVE-2013-6415] XSS Vulnerability in number_to_currency",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ"
            },
            {
              "name": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
            },
            {
              "name": "RHSA-2014:1863",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
            },
            {
              "name": "RHSA-2013:1794",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
            },
            {
              "name": "64077",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/64077"
            },
            {
              "name": "56093",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56093"
            },
            {
              "name": "DSA-2888",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2888"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-6415",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-11-04T00:00:00",
    "dateUpdated": "2024-08-06T17:39:01.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-1099
Vulnerability from cvelistv5
Published
2012-03-13 10:00
Modified
2024-08-06 18:45
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:45:27.487Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2012-3321",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html"
          },
          {
            "name": "[oss-security] 20120302 Re: CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1"
          },
          {
            "name": "FEDORA-2012-3355",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799276"
          },
          {
            "name": "DSA-2466",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2466"
          },
          {
            "name": "[oss-security] 20120302 CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6"
          },
          {
            "name": "[rubyonrails-security] 20120301 XSS Vulnerability in the select helper",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source\u0026output=gplain"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-17T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2012-3321",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html"
        },
        {
          "name": "[oss-security] 20120302 Re: CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1"
        },
        {
          "name": "FEDORA-2012-3355",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799276"
        },
        {
          "name": "DSA-2466",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2466"
        },
        {
          "name": "[oss-security] 20120302 CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6"
        },
        {
          "name": "[rubyonrails-security] 20120301 XSS Vulnerability in the select helper",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source\u0026output=gplain"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-1099",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2012-3321",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html"
            },
            {
              "name": "[oss-security] 20120302 Re: CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1"
            },
            {
              "name": "FEDORA-2012-3355",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=799276",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799276"
            },
            {
              "name": "DSA-2466",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2466"
            },
            {
              "name": "[oss-security] 20120302 CVE Request -- Ruby on Rails (v3.0.12) / rubygem-actionpack: Two XSS flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6"
            },
            {
              "name": "[rubyonrails-security] 20120301 XSS Vulnerability in the select helper",
              "refsource": "MLIST",
              "url": "http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source\u0026output=gplain"
            },
            {
              "name": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-1099",
    "datePublished": "2012-03-13T10:00:00",
    "dateReserved": "2012-02-14T00:00:00",
    "dateUpdated": "2024-08-06T18:45:27.487Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-1855
Vulnerability from cvelistv5
Published
2013-03-19 22:00
Modified
2024-08-06 15:20
Severity ?
Summary
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:35.175Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "APPLE-SA-2013-10-22-5",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
          },
          {
            "name": "[rubyonrails-security] 20130318 [CVE-2013-1855] XSS vulnerability in sanitize_css in Action Pack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain"
          },
          {
            "name": "openSUSE-SU-2014:0019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
          },
          {
            "name": "openSUSE-SU-2013:0662",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5784"
          },
          {
            "name": "RHSA-2013:0698",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html"
          },
          {
            "name": "APPLE-SA-2013-06-04-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
          },
          {
            "name": "openSUSE-SU-2013:0661",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"
          },
          {
            "name": "RHSA-2014:1863",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-12-09T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "APPLE-SA-2013-10-22-5",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
        },
        {
          "name": "[rubyonrails-security] 20130318 [CVE-2013-1855] XSS vulnerability in sanitize_css in Action Pack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain"
        },
        {
          "name": "openSUSE-SU-2014:0019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"
        },
        {
          "name": "openSUSE-SU-2013:0662",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5784"
        },
        {
          "name": "RHSA-2013:0698",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html"
        },
        {
          "name": "APPLE-SA-2013-06-04-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
        },
        {
          "name": "openSUSE-SU-2013:0661",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"
        },
        {
          "name": "RHSA-2014:1863",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-1855",
    "datePublished": "2013-03-19T22:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:35.175Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-4491
Vulnerability from cvelistv5
Published
2013-12-07 00:00
Modified
2024-08-06 16:45
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/translation_helper.rb in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.928Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2014:0008",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
          },
          {
            "name": "openSUSE-SU-2013:1906",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
          },
          {
            "name": "57836",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57836"
          },
          {
            "name": "openSUSE-SU-2014:0009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
          },
          {
            "name": "openSUSE-SU-2013:1907",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
          },
          {
            "name": "64076",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/64076"
          },
          {
            "name": "openSUSE-SU-2013:1904",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
          },
          {
            "name": "[ruby-security-ann] 20131203 [CVE-2013-4491] Reflective XSS Vulnerability in Ruby on Rails",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
          },
          {
            "name": "RHSA-2014:1863",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
          },
          {
            "name": "RHSA-2013:1794",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
          },
          {
            "name": "DSA-2888",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2888"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2013-4491"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/translation_helper.rb in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2014:0008",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
        },
        {
          "name": "openSUSE-SU-2013:1906",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
        },
        {
          "name": "57836",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57836"
        },
        {
          "name": "openSUSE-SU-2014:0009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
        },
        {
          "name": "openSUSE-SU-2013:1907",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
        },
        {
          "name": "64076",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/64076"
        },
        {
          "name": "openSUSE-SU-2013:1904",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
        },
        {
          "name": "[ruby-security-ann] 20131203 [CVE-2013-4491] Reflective XSS Vulnerability in Ruby on Rails",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
        },
        {
          "name": "RHSA-2014:1863",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
        },
        {
          "name": "RHSA-2013:1794",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
        },
        {
          "name": "DSA-2888",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2888"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2013-4491"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4491",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/translation_helper.rb in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2014:0008",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0008.html"
            },
            {
              "name": "openSUSE-SU-2013:1906",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"
            },
            {
              "name": "57836",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57836"
            },
            {
              "name": "openSUSE-SU-2014:0009",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
            },
            {
              "name": "openSUSE-SU-2013:1907",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"
            },
            {
              "name": "64076",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/64076"
            },
            {
              "name": "openSUSE-SU-2013:1904",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"
            },
            {
              "name": "[ruby-security-ann] 20131203 [CVE-2013-4491] Reflective XSS Vulnerability in Ruby on Rails",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ"
            },
            {
              "name": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"
            },
            {
              "name": "RHSA-2014:1863",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
            },
            {
              "name": "RHSA-2013:1794",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-1794.html"
            },
            {
              "name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/",
              "refsource": "CONFIRM",
              "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
            },
            {
              "name": "DSA-2888",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-2888"
            },
            {
              "name": "https://puppet.com/security/cve/cve-2013-4491",
              "refsource": "CONFIRM",
              "url": "https://puppet.com/security/cve/cve-2013-4491"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4491",
    "datePublished": "2013-12-07T00:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.928Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4214
Vulnerability from cvelistv5
Published
2009-12-07 17:00
Modified
2024-08-07 06:54
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:54:09.938Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[rubyonrails-security] 20091127 XSS Weakness in strip_tags",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1"
          },
          {
            "name": "37446",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37446"
          },
          {
            "name": "ADV-2009-3352",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3352"
          },
          {
            "name": "DSA-2301",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2301"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released"
          },
          {
            "name": "37142",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37142"
          },
          {
            "name": "DSA-2260",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2260"
          },
          {
            "name": "[oss-security] 20091127 CVE request: ruby on rails XSS Weakness in strip_tags",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/11/27/2"
          },
          {
            "name": "SUSE-SR:2010:006",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "name": "1023245",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023245"
          },
          {
            "name": "38915",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38915"
          },
          {
            "name": "[oss-security] 20091208 Re: CVE request: ruby on rails XSS Weakness in strip_tags",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/12/08/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-11-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-12-17T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[rubyonrails-security] 20091127 XSS Weakness in strip_tags",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1"
        },
        {
          "name": "37446",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37446"
        },
        {
          "name": "ADV-2009-3352",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3352"
        },
        {
          "name": "DSA-2301",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2301"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released"
        },
        {
          "name": "37142",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37142"
        },
        {
          "name": "DSA-2260",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2260"
        },
        {
          "name": "[oss-security] 20091127 CVE request: ruby on rails XSS Weakness in strip_tags",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/11/27/2"
        },
        {
          "name": "SUSE-SR:2010:006",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "name": "1023245",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023245"
        },
        {
          "name": "38915",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38915"
        },
        {
          "name": "[oss-security] 20091208 Re: CVE request: ruby on rails XSS Weakness in strip_tags",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/12/08/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4214",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[rubyonrails-security] 20091127 XSS Weakness in strip_tags",
              "refsource": "MLIST",
              "url": "http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1"
            },
            {
              "name": "37446",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37446"
            },
            {
              "name": "ADV-2009-3352",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3352"
            },
            {
              "name": "DSA-2301",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2301"
            },
            {
              "name": "APPLE-SA-2010-03-29-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
            },
            {
              "name": "http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released"
            },
            {
              "name": "37142",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37142"
            },
            {
              "name": "DSA-2260",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2260"
            },
            {
              "name": "[oss-security] 20091127 CVE request: ruby on rails XSS Weakness in strip_tags",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/11/27/2"
            },
            {
              "name": "SUSE-SR:2010:006",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
            },
            {
              "name": "http://support.apple.com/kb/HT4077",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4077"
            },
            {
              "name": "1023245",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023245"
            },
            {
              "name": "38915",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38915"
            },
            {
              "name": "[oss-security] 20091208 Re: CVE request: ruby on rails XSS Weakness in strip_tags",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/12/08/3"
            },
            {
              "name": "http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5",
              "refsource": "CONFIRM",
              "url": "http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4214",
    "datePublished": "2009-12-07T17:00:00",
    "dateReserved": "2009-12-07T00:00:00",
    "dateUpdated": "2024-08-07T06:54:09.938Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-3221
Vulnerability from cvelistv5
Published
2013-04-22 01:00
Modified
2024-08-06 16:00
Severity ?
Summary
The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks against Ruby on Rails applications via a crafted value, as demonstrated by unintended interaction between the "typed XML" feature and a MySQL database.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:00:10.162Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/"
          },
          {
            "name": "[rubyonrails-security] 20130207 Potential Query Manipulation with Common Rails Practises",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source\u0026output=gplain"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.phenoelit.org/blog/archives/2013/02/index.html"
          },
          {
            "name": "[oss-security] 20130424 CVE-2013-3221 can also relate to Microsoft SQL Server and IBM DB2",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2013/04/24/7"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://gist.github.com/dakull/5442275"
          },
          {
            "name": "[oss-security] 20130207 Potential Query Manipulation with Common Rails Practises",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2013/02/06/7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-02-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks against Ruby on Rails applications via a crafted value, as demonstrated by unintended interaction between the \"typed XML\" feature and a MySQL database."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-25T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/"
        },
        {
          "name": "[rubyonrails-security] 20130207 Potential Query Manipulation with Common Rails Practises",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source\u0026output=gplain"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.phenoelit.org/blog/archives/2013/02/index.html"
        },
        {
          "name": "[oss-security] 20130424 CVE-2013-3221 can also relate to Microsoft SQL Server and IBM DB2",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2013/04/24/7"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://gist.github.com/dakull/5442275"
        },
        {
          "name": "[oss-security] 20130207 Potential Query Manipulation with Common Rails Practises",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2013/02/06/7"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-3221",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks against Ruby on Rails applications via a crafted value, as demonstrated by unintended interaction between the \"typed XML\" feature and a MySQL database."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/",
              "refsource": "MISC",
              "url": "http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/"
            },
            {
              "name": "[rubyonrails-security] 20130207 Potential Query Manipulation with Common Rails Practises",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source\u0026output=gplain"
            },
            {
              "name": "http://www.phenoelit.org/blog/archives/2013/02/index.html",
              "refsource": "MISC",
              "url": "http://www.phenoelit.org/blog/archives/2013/02/index.html"
            },
            {
              "name": "[oss-security] 20130424 CVE-2013-3221 can also relate to Microsoft SQL Server and IBM DB2",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2013/04/24/7"
            },
            {
              "name": "https://gist.github.com/dakull/5442275",
              "refsource": "CONFIRM",
              "url": "https://gist.github.com/dakull/5442275"
            },
            {
              "name": "[oss-security] 20130207 Potential Query Manipulation with Common Rails Practises",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2013/02/06/7"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-3221",
    "datePublished": "2013-04-22T01:00:00",
    "dateReserved": "2013-04-21T00:00:00",
    "dateUpdated": "2024-08-06T16:00:10.162Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2931
Vulnerability from cvelistv5
Published
2011-08-29 18:00
Modified
2024-08-06 23:15
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.957Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[rubyonrails-security] 20110816 XSS Vulnerability in strip_tags helper",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source\u0026output=gplain"
          },
          {
            "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
          },
          {
            "name": "FEDORA-2011-11386",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
          },
          {
            "name": "FEDORA-2011-11567",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731436"
          },
          {
            "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
          },
          {
            "name": "DSA-2301",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2301"
          },
          {
            "name": "45921",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45921"
          },
          {
            "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
          },
          {
            "name": "FEDORA-2011-11572",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-23T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[rubyonrails-security] 20110816 XSS Vulnerability in strip_tags helper",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source\u0026output=gplain"
        },
        {
          "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
        },
        {
          "name": "FEDORA-2011-11386",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
        },
        {
          "name": "FEDORA-2011-11567",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731436"
        },
        {
          "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
        },
        {
          "name": "DSA-2301",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2301"
        },
        {
          "name": "45921",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45921"
        },
        {
          "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
        },
        {
          "name": "FEDORA-2011-11572",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-2931",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[rubyonrails-security] 20110816 XSS Vulnerability in strip_tags helper",
              "refsource": "MLIST",
              "url": "http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source\u0026output=gplain"
            },
            {
              "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
            },
            {
              "name": "FEDORA-2011-11386",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
            },
            {
              "name": "FEDORA-2011-11567",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=731436",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731436"
            },
            {
              "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
            },
            {
              "name": "DSA-2301",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2301"
            },
            {
              "name": "45921",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/45921"
            },
            {
              "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
            },
            {
              "name": "FEDORA-2011-11572",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
            },
            {
              "name": "https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a",
              "refsource": "CONFIRM",
              "url": "https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
            },
            {
              "name": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2931",
    "datePublished": "2011-08-29T18:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.957Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-3464
Vulnerability from cvelistv5
Published
2012-08-10 10:00
Modified
2024-08-06 20:05
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a ' (quote) character.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:05:12.658Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
          },
          {
            "name": "50694",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50694"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          },
          {
            "name": "[rubyonrails-security] 20120810 Potential XSS Vulnerability in Ruby on Rails",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source\u0026output=gplain"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a \u0027 (quote) character."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-07T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
        },
        {
          "name": "50694",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50694"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        },
        {
          "name": "[rubyonrails-security] 20120810 Potential XSS Vulnerability in Ruby on Rails",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source\u0026output=gplain"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-3464",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a \u0027 (quote) character."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/"
            },
            {
              "name": "50694",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50694"
            },
            {
              "name": "RHSA-2013:0154",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
            },
            {
              "name": "[rubyonrails-security] 20120810 Potential XSS Vulnerability in Ruby on Rails",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source\u0026output=gplain"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-3464",
    "datePublished": "2012-08-10T10:00:00",
    "dateReserved": "2012-06-14T00:00:00",
    "dateUpdated": "2024-08-06T20:05:12.658Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-4094
Vulnerability from cvelistv5
Published
2008-09-30 17:00
Modified
2024-08-07 10:00
Severity ?
Summary
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:00:42.864Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://gist.github.com/8946"
          },
          {
            "name": "rubyonrails-activerecord-sql-injection(45109)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45109"
          },
          {
            "name": "[oss-security] 20080913 CVE request: Ruby on Rails \u003c2.1.1 :limit and :offset SQL injection",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/09/13/2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://rails.lighthouseapp.com/projects/8994/tickets/964"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://rails.lighthouseapp.com/projects/8994/tickets/288"
          },
          {
            "name": "31875",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31875"
          },
          {
            "name": "SUSE-SR:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
          },
          {
            "name": "31910",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31910"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1"
          },
          {
            "name": "1020871",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020871"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/"
          },
          {
            "name": "[oss-security] 20080915 Re: CVE request: Ruby on Rails \u003c2.1.1 :limit and :offset SQL injection",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/09/16/1"
          },
          {
            "name": "31176",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31176"
          },
          {
            "name": "31909",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31909"
          },
          {
            "name": "ADV-2008-2562",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2562"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-09-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://gist.github.com/8946"
        },
        {
          "name": "rubyonrails-activerecord-sql-injection(45109)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45109"
        },
        {
          "name": "[oss-security] 20080913 CVE request: Ruby on Rails \u003c2.1.1 :limit and :offset SQL injection",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/09/13/2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://rails.lighthouseapp.com/projects/8994/tickets/964"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://rails.lighthouseapp.com/projects/8994/tickets/288"
        },
        {
          "name": "31875",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31875"
        },
        {
          "name": "SUSE-SR:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
        },
        {
          "name": "31910",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31910"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1"
        },
        {
          "name": "1020871",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020871"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/"
        },
        {
          "name": "[oss-security] 20080915 Re: CVE request: Ruby on Rails \u003c2.1.1 :limit and :offset SQL injection",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/09/16/1"
        },
        {
          "name": "31176",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31176"
        },
        {
          "name": "31909",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31909"
        },
        {
          "name": "ADV-2008-2562",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2562"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4094",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://gist.github.com/8946",
              "refsource": "CONFIRM",
              "url": "http://gist.github.com/8946"
            },
            {
              "name": "rubyonrails-activerecord-sql-injection(45109)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45109"
            },
            {
              "name": "[oss-security] 20080913 CVE request: Ruby on Rails \u003c2.1.1 :limit and :offset SQL injection",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/09/13/2"
            },
            {
              "name": "http://rails.lighthouseapp.com/projects/8994/tickets/964",
              "refsource": "CONFIRM",
              "url": "http://rails.lighthouseapp.com/projects/8994/tickets/964"
            },
            {
              "name": "http://rails.lighthouseapp.com/projects/8994/tickets/288",
              "refsource": "CONFIRM",
              "url": "http://rails.lighthouseapp.com/projects/8994/tickets/288"
            },
            {
              "name": "31875",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31875"
            },
            {
              "name": "SUSE-SR:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
            },
            {
              "name": "31910",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31910"
            },
            {
              "name": "http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1",
              "refsource": "MISC",
              "url": "http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1"
            },
            {
              "name": "1020871",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020871"
            },
            {
              "name": "http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/",
              "refsource": "MISC",
              "url": "http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/"
            },
            {
              "name": "[oss-security] 20080915 Re: CVE request: Ruby on Rails \u003c2.1.1 :limit and :offset SQL injection",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/09/16/1"
            },
            {
              "name": "31176",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31176"
            },
            {
              "name": "31909",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31909"
            },
            {
              "name": "ADV-2008-2562",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2562"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4094",
    "datePublished": "2008-09-30T17:00:00",
    "dateReserved": "2008-09-15T00:00:00",
    "dateUpdated": "2024-08-07T10:00:42.864Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-0130
Vulnerability from cvelistv5
Published
2014-05-07 10:00
Modified
2024-08-06 09:05
Severity ?
Summary
Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:05:38.953Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2014:1863",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf"
          },
          {
            "name": "[rubyonrails-security] 20140506 [CVE-2014-0130] Directory Traversal Vulnerability With Certain Route Configurations",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ"
          },
          {
            "name": "67244",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67244"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-06-02T14:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2014:1863",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf"
        },
        {
          "name": "[rubyonrails-security] 20140506 [CVE-2014-0130] Directory Traversal Vulnerability With Certain Route Configurations",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ"
        },
        {
          "name": "67244",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67244"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-0130",
    "datePublished": "2014-05-07T10:00:00",
    "dateReserved": "2013-12-03T00:00:00",
    "dateUpdated": "2024-08-06T09:05:38.953Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2661
Vulnerability from cvelistv5
Published
2012-06-22 14:00
Modified
2024-08-06 19:42
Severity ?
Summary
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:31.596Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[rubyonrails-security] 20120531 SQL Injection Vulnerability in Ruby on Rails (CVE-2012-2661)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source\u0026output=gplain"
          },
          {
            "name": "SUSE-SU-2012:1012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
          },
          {
            "name": "SUSE-SU-2012:1014",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
          },
          {
            "name": "openSUSE-SU-2012:1066",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
          },
          {
            "name": "RHSA-2013:0154",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-11-06T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[rubyonrails-security] 20120531 SQL Injection Vulnerability in Ruby on Rails (CVE-2012-2661)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source\u0026output=gplain"
        },
        {
          "name": "SUSE-SU-2012:1012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
        },
        {
          "name": "SUSE-SU-2012:1014",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
        },
        {
          "name": "openSUSE-SU-2012:1066",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
        },
        {
          "name": "RHSA-2013:0154",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-2661",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[rubyonrails-security] 20120531 SQL Injection Vulnerability in Ruby on Rails (CVE-2012-2661)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source\u0026output=gplain"
            },
            {
              "name": "SUSE-SU-2012:1012",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html"
            },
            {
              "name": "SUSE-SU-2012:1014",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html"
            },
            {
              "name": "openSUSE-SU-2012:1066",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html"
            },
            {
              "name": "RHSA-2013:0154",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2661",
    "datePublished": "2012-06-22T14:00:00",
    "dateReserved": "2012-05-14T00:00:00",
    "dateUpdated": "2024-08-06T19:42:31.596Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2932
Vulnerability from cvelistv5
Published
2011-08-29 18:00
Modified
2024-08-06 23:15
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.926Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731435"
          },
          {
            "name": "45917",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45917"
          },
          {
            "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
          },
          {
            "name": "FEDORA-2011-11579",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
          },
          {
            "name": "FEDORA-2011-11600",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html"
          },
          {
            "name": "FEDORA-2011-11386",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
          },
          {
            "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
          },
          {
            "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd"
          },
          {
            "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
          },
          {
            "name": "[rubyonrails-security] 20110816 XSS Vulnerability in the escaping function in Ruby on Rails",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source\u0026output=gplain"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a \"UTF-8 escaping vulnerability.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-23T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731435"
        },
        {
          "name": "45917",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45917"
        },
        {
          "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
        },
        {
          "name": "FEDORA-2011-11579",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
        },
        {
          "name": "FEDORA-2011-11600",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html"
        },
        {
          "name": "FEDORA-2011-11386",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
        },
        {
          "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
        },
        {
          "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd"
        },
        {
          "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
        },
        {
          "name": "[rubyonrails-security] 20110816 XSS Vulnerability in the escaping function in Ruby on Rails",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source\u0026output=gplain"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-2932",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a \"UTF-8 escaping vulnerability.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=731435",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731435"
            },
            {
              "name": "45917",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/45917"
            },
            {
              "name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
            },
            {
              "name": "FEDORA-2011-11579",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
            },
            {
              "name": "FEDORA-2011-11600",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html"
            },
            {
              "name": "FEDORA-2011-11386",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
            },
            {
              "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
            },
            {
              "name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
            },
            {
              "name": "https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd",
              "refsource": "CONFIRM",
              "url": "https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd"
            },
            {
              "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
            },
            {
              "name": "[rubyonrails-security] 20110816 XSS Vulnerability in the escaping function in Ruby on Rails",
              "refsource": "MLIST",
              "url": "http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source\u0026output=gplain"
            },
            {
              "name": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6",
              "refsource": "CONFIRM",
              "url": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2932",
    "datePublished": "2011-08-29T18:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.926Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-0082
Vulnerability from cvelistv5
Published
2014-02-20 11:00
Modified
2024-08-06 09:05
Severity ?
Summary
actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:05:37.065Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[rubyonrails-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ"
          },
          {
            "name": "RHSA-2014:0215",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
          },
          {
            "name": "57836",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57836"
          },
          {
            "name": "RHSA-2014:0306",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2014-0082"
          },
          {
            "name": "openSUSE-SU-2014:0295",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html"
          },
          {
            "name": "57376",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57376"
          },
          {
            "name": "[oss-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2014/02/18/10"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-02-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[rubyonrails-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ"
        },
        {
          "name": "RHSA-2014:0215",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
        },
        {
          "name": "57836",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57836"
        },
        {
          "name": "RHSA-2014:0306",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2014-0082"
        },
        {
          "name": "openSUSE-SU-2014:0295",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html"
        },
        {
          "name": "57376",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57376"
        },
        {
          "name": "[oss-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2014/02/18/10"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2014-0082",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[rubyonrails-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
              "refsource": "MLIST",
              "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ"
            },
            {
              "name": "RHSA-2014:0215",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0215.html"
            },
            {
              "name": "57836",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57836"
            },
            {
              "name": "RHSA-2014:0306",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2014-0306.html"
            },
            {
              "name": "https://puppet.com/security/cve/cve-2014-0082",
              "refsource": "CONFIRM",
              "url": "https://puppet.com/security/cve/cve-2014-0082"
            },
            {
              "name": "openSUSE-SU-2014:0295",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html"
            },
            {
              "name": "57376",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57376"
            },
            {
              "name": "[oss-security] 20140218 Denial of Service Vulnerability in Action View when using render :text (CVE-2014-0082)",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2014/02/18/10"
            },
            {
              "name": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/",
              "refsource": "CONFIRM",
              "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-0082",
    "datePublished": "2014-02-20T11:00:00",
    "dateReserved": "2013-12-03T00:00:00",
    "dateUpdated": "2024-08-06T09:05:37.065Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-0333
Vulnerability from cvelistv5
Published
2013-01-30 11:00
Modified
2024-08-06 14:25
Severity ?
Summary
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:25:09.069Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#628463",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/628463"
          },
          {
            "name": "DSA-2613",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2613"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5784"
          },
          {
            "name": "APPLE-SA-2013-06-04-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
          },
          {
            "name": "APPLE-SA-2013-03-14-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
          },
          {
            "name": "[rubyonrails-security] 20130129 Vulnerability in JSON Parser in Ruby on Rails 3.0 and 2.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source\u0026output=gplain"
          },
          {
            "name": "RHSA-2013:0201",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0201.html"
          },
          {
            "name": "RHSA-2013:0202",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0202.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://puppet.com/security/cve/cve-2013-0333"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/"
          },
          {
            "name": "RHSA-2013:0203",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0203.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-01-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-08T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "VU#628463",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/628463"
        },
        {
          "name": "DSA-2613",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2613"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5784"
        },
        {
          "name": "APPLE-SA-2013-06-04-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
        },
        {
          "name": "APPLE-SA-2013-03-14-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
        },
        {
          "name": "[rubyonrails-security] 20130129 Vulnerability in JSON Parser in Ruby on Rails 3.0 and 2.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source\u0026output=gplain"
        },
        {
          "name": "RHSA-2013:0201",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0201.html"
        },
        {
          "name": "RHSA-2013:0202",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0202.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://puppet.com/security/cve/cve-2013-0333"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/"
        },
        {
          "name": "RHSA-2013:0203",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0203.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-0333",
    "datePublished": "2013-01-30T11:00:00",
    "dateReserved": "2012-12-06T00:00:00",
    "dateUpdated": "2024-08-06T14:25:09.069Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}