CVE-2013-0285
Publication date 9 April 2013
Last updated 24 July 2024
Ubuntu priority
Description
The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| rails | ||
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty | Not in release | |
| ruby-actionpack-2.3 | ||
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| ruby-actionpack-3.2 | ||
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
Notes
Patch details
| Package | Patch details |
|---|---|
| rails |
|
| ruby-actionpack-2.3 | |
| ruby-actionpack-3.2 |