7.5
CVSSv2

CVE-2013-0333

Published: 30/01/2013 Updated: 13/02/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 756
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x prior to 2.3.16 and 3.0.x prior to 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote malicious users to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails rails 2.3.0

rubyonrails rails 2.3.1

rubyonrails rails 2.3.2

rubyonrails rails 2.3.3

rubyonrails rails 2.3.4

rubyonrails rails 2.3.9

rubyonrails rails 2.3.10

rubyonrails rails 2.3.11

rubyonrails rails 2.3.12

rubyonrails rails 2.3.13

rubyonrails rails 2.3.14

rubyonrails rails 2.3.15

rubyonrails ruby on rails 3.0.4

rubyonrails rails 3.0.0

rubyonrails rails 3.0.1

rubyonrails rails 3.0.2

rubyonrails rails 3.0.10

rubyonrails rails 3.0.12

rubyonrails rails 3.0.13

rubyonrails rails 3.0.3

rubyonrails rails 3.0.11

rubyonrails rails 3.0.14

rubyonrails rails 3.0.16

rubyonrails rails 3.0.17

rubyonrails rails 3.0.18

rubyonrails rails 3.0.19

rubyonrails rails 3.0.4

rubyonrails rails 3.0.5

rubyonrails rails 3.0.6

rubyonrails rails 3.0.7

rubyonrails rails 3.0.8

rubyonrails rails 3.0.9

Vendor Advisories

Synopsis Critical: rubygem-activesupport security update Type/Severity Security Advisory: Critical Topic An updated rubygem-activesupport package that fixes one security issue isnow available for Red Hat Subscription Asset ManagerThe Red Hat Security Response Team has rated this update as having criticalse ...
Synopsis Critical: rubygem-activesupport security update Type/Severity Security Advisory: Critical Topic An updated rubygem-activesupport package that fixes one security issue isnow available for Red Hat OpenShift Enterprise 10The Red Hat Security Response Team has rated this update as having criticalsecu ...
Debian Bug report logs - #699226 rails: CVE-2013-0333: Vulnerability in JSON Parser in Ruby on Rails 30 and 23 Package: rails; Maintainer for rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rails is src:rails (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso & ...
Lawrence Pit discovered that Ruby on Rails, a web development framework, is vulnerable to a flaw in the parsing of JSON to YAML Using a specially crafted payload attackers can trick the backend into decoding a subset of YAML The vulnerability has been addressed by removing the YAML backend and adding the OkJson backend For the stable distributio ...

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit ...

Github Repositories

Inspect all of your heroku apps to see if they are running a vulnerable version of Rails

heroku-CVE-2013-0156 This vulnerability has been supplanted by CVE-2013-0333 See groupsgooglecom/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo for more details A replacement for this script, covering CVE-2013-0333, can be found at githubcom/heroku/heroku-CVE-2013-0333

heroku-CVE-2013-0333 Inspect all of your heroku apps to see if they are running a vulnerable version of Rails Background A serious security vulnerability has been found in the Ruby on Rails framework This exploit affects nearly all applications running Rails versions 23 and 30, and a patch has been made available Rails developers can get a full list of all your affected Her

The only safe eval is no eval.

Disable Eval The only safe eval is no eval This gem provides the method DisableEvalprotect, which does the following: Undefines all builtin eval methods Verifies that no one has aliased those methods to other names Note that it is not practically possible to eliminate every single way of evaluating code if you can arbitrary methods on arbitrary objects with arbitrary argu