CVE-2013-0269

HIGH

Description

The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."

References

http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html

http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html

http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html

http://rhn.redhat.com/errata/RHSA-2013-0686.html

http://rhn.redhat.com/errata/RHSA-2013-0701.html

http://rhn.redhat.com/errata/RHSA-2013-1028.html

http://rhn.redhat.com/errata/RHSA-2013-1147.html

http://secunia.com/advisories/52075

http://secunia.com/advisories/52774

http://secunia.com/advisories/52902

http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed

http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/

http://www.openwall.com/lists/oss-security/2013/02/11/7

http://www.openwall.com/lists/oss-security/2013/02/11/8

http://www.osvdb.org/90074

http://www.securityfocus.com/bid/57899

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862

http://www.ubuntu.com/usn/USN-1733-1

http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection

https://exchange.xforce.ibmcloud.com/vulnerabilities/82010

https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain

https://puppet.com/security/cve/cve-2013-0269

Details

Source: MITRE

Published: 2013-02-13

Updated: 2017-12-09

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH