CVE-2013-0285 (GCVE-0-2013-0285)

Vulnerability from cvelistv5 – Published: 2013-04-09 20:00 – Updated: 2024-09-16 18:54
VLAI?
Summary
The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:18:09.596Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130213 Some rubygems related CVEs",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q1/304"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-09T20:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20130213 Some rubygems related CVEs",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q1/304"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-0285",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20130213 Some rubygems related CVEs",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2013/q1/304"
            },
            {
              "name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
              "refsource": "MISC",
              "url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-0285",
    "datePublished": "2013-04-09T20:00:00Z",
    "dateReserved": "2012-12-06T00:00:00Z",
    "dateUpdated": "2024-09-16T18:54:26.722Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nori_gem_project:nori_gem:2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7F11167-EC4D-44B6-A368-1F0EB3EE6F70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nori_gem_project:nori_gem:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EA58AED-413C-419E-B36E-F3509D65513F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nori_gem_project:nori_gem:1.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB056B7F-7D12-40AC-AF17-45C0B60DED1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nori_gem_project:nori_gem:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5076DB7D-D183-4B5F-907F-5A08B76E6675\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nori_gem_project:nori_gem:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC29C39B-6FBA-4C11-ACA8-A0575252BA36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nori_gem_project:nori_gem:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6829ADA-BB4A-435C-91BC-0932BDC9B845\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nori_gem_project:nori_gem:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15633FDB-CFBD-463A-8FFD-909DD219F9A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nori_gem_project:nori_gem:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7AAAAB1-7F6C-45C8-B13F-F97F84C90F11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nori_gem_project:nori_gem:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BA998B4-1671-408E-A645-29FE42293FF6\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.\"}, {\"lang\": \"es\", \"value\": \"La gema nori v2.0.x anterior a v2.0.2, v1.1.x anterior a v1.1.4, y v1.0.x anterior a v1.0.3 para Ruby no restringe adecuadamente el \\\"casting\\\" de las variables de tipo cadena, lo que permite a atacantes remotos llevar a cabo ataques de inyecci\\u00f3n de objetos y la ejecuci\\u00f3n de c\\u00f3digo arbitrario o provocar una denegaci\\u00f3n de servicio (consumo de memoria y CPU) involucrando a referencias de entidades XML anidadas, aprovechando el soporte de Action Pack para loo tipos de conversion (1) YAML o (2) Symbol, una vulnerabilidad similar a CVE-2013-0156.\"}]",
      "id": "CVE-2013-0285",
      "lastModified": "2024-11-21T01:47:13.690",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2013-04-09T20:55:01.677",
      "references": "[{\"url\": \"http://seclists.org/oss-sec/2013/q1/304\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://seclists.org/oss-sec/2013/q1/304\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "secalert@redhat.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-0285\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-04-09T20:55:01.677\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.\"},{\"lang\":\"es\",\"value\":\"La gema nori v2.0.x anterior a v2.0.2, v1.1.x anterior a v1.1.4, y v1.0.x anterior a v1.0.3 para Ruby no restringe adecuadamente el \\\"casting\\\" de las variables de tipo cadena, lo que permite a atacantes remotos llevar a cabo ataques de inyecci\u00f3n de objetos y la ejecuci\u00f3n de c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (consumo de memoria y CPU) involucrando a referencias de entidades XML anidadas, aprovechando el soporte de Action Pack para loo tipos de conversion (1) YAML o (2) Symbol, una vulnerabilidad similar a CVE-2013-0156.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nori_gem_project:nori_gem:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F11167-EC4D-44B6-A368-1F0EB3EE6F70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nori_gem_project:nori_gem:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA58AED-413C-419E-B36E-F3509D65513F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nori_gem_project:nori_gem:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB056B7F-7D12-40AC-AF17-45C0B60DED1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nori_gem_project:nori_gem:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5076DB7D-D183-4B5F-907F-5A08B76E6675\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nori_gem_project:nori_gem:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC29C39B-6FBA-4C11-ACA8-A0575252BA36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nori_gem_project:nori_gem:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6829ADA-BB4A-435C-91BC-0932BDC9B845\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nori_gem_project:nori_gem:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15633FDB-CFBD-463A-8FFD-909DD219F9A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nori_gem_project:nori_gem:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7AAAAB1-7F6C-45C8-B13F-F97F84C90F11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nori_gem_project:nori_gem:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA998B4-1671-408E-A645-29FE42293FF6\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/oss-sec/2013/q1/304\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://seclists.org/oss-sec/2013/q1/304\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…