The nori gem 2.0.x prior to 2.0.2, 1.1.x prior to 1.1.4, and 1.0.x prior to 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote malicious users to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
nori gem project nori gem 2.0.0 |
||
nori gem project nori gem 2.0.1 |
||
nori gem project nori gem 1.1.2 |
||
nori gem project nori gem 1.1.3 |
||
nori gem project nori gem 1.1.0 |
||
nori gem project nori gem 1.1.1 |
||
nori gem project nori gem 1.0.2 |
||
nori gem project nori gem 1.0.0 |
||
nori gem project nori gem 1.0.1 |