This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Ruby on Rails team reports :
Two high-risk vulnerabilities have been discovered :
(CVE-2013-0155) There is a vulnerability when Active Record is used in
conjunction with JSON parameter parsing.
Due to the way Active Record interprets parameters in combination with
the way that JSON parameters are parsed, it is possible for an
attacker to issue unexpected database queries with 'IS NULL' or empty
'WHERE' clauses. This issue does not let an attacker insert arbitrary
values into a SQL query, however they can cause the query to check
for NULL or eliminate a WHERE clause when most users would not expect
(CVE-2013-0156) There are multiple weaknesses in the parameter parsing
code for Ruby on Rails which allows attackers to bypass authentication
systems, inject arbitrary SQL, inject and execute arbitrary code, or
perform a DoS attack on a Rails application.
The parameter parsing code of Ruby on Rails allows applications to
automatically cast values from strings to certain data types.
Unfortunately the type casting code supported certain conversions
which were not suitable for performing on user-provided data including
creating Symbols and parsing YAML. These unsuitable conversions can be
used by an attacker to compromise a Rails application.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
Public Exploit Available : true