[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-0175Date: (C)2013-04-27   (M)2023-12-22


multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
http://www.openwall.com/lists/oss-security/2013/01/11/9
https://gist.github.com/nate/d7f6d9f4925f413621aa
https://github.com/sferik/multi_xml/pull/34
https://groups.google.com/forum/?fromgroups=#%21topic/ruby-grape/fthDkMgIOa0
https://news.ycombinator.com/item?id=5040457

CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:104516
oval:org.secpod.oval:def:104523

© SecPod Technologies