5
CVSSv2

CVE-2014-0082

Published: 20/02/2014 Updated: 08/08/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x prior to 3.2.17 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote malicious users to cause a denial of service (memory consumption) by including these strings in headers.

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails ruby on rails 3.2.14

rubyonrails rails 3.2.15

rubyonrails ruby on rails 3.2.15

rubyonrails rails 3.0.0

rubyonrails rails 3.0.12

rubyonrails rails 3.0.13

rubyonrails rails 3.0.2

rubyonrails rails 3.0.20

rubyonrails rails 3.0.6

rubyonrails rails 3.0.8

rubyonrails rails 3.1.0

rubyonrails rails 3.1.2

rubyonrails rails 3.1.8

rubyonrails rails 3.1.9

rubyonrails rails 3.2.12

rubyonrails rails 3.2.13

rubyonrails rails 3.2.4

rubyonrails rails 3.2.5

rubyonrails rails 3.0.1

rubyonrails rails 3.0.14

rubyonrails rails 3.0.3

rubyonrails ruby on rails 3.0.4

rubyonrails rails 3.0.7

rubyonrails rails 3.0.9

rubyonrails rails 3.1.1

rubyonrails rails 3.1.3

rubyonrails rails 3.1.4

rubyonrails rails 3.2.0

rubyonrails rails 3.2.2

rubyonrails rails 3.2.6

rubyonrails rails 3.2.7

rubyonrails rails 3.0.10

rubyonrails rails 3.0.16

rubyonrails rails 3.0.17

rubyonrails rails 3.0.4

rubyonrails rails 3.1.5

rubyonrails rails 3.2.1

rubyonrails rails 3.2.3

rubyonrails rails 3.2.8

rubyonrails rails 3.2.9

rubyonrails rails 3.0.11

rubyonrails rails 3.0.18

rubyonrails rails 3.0.19

rubyonrails rails 3.0.5

rubyonrails rails 3.1.10

rubyonrails rails 3.1.6

rubyonrails rails 3.1.7

rubyonrails rails 3.2.10

rubyonrails rails 3.2.11

rubyonrails ruby on rails

Vendor Advisories

actionpack/lib/action_view/template/textrb in Action View in Ruby on Rails 3x before 3217 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers ...