CVE-2013-0333

Severity

75%

Complexity

99%

Confidentiality

106%

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Overview

Type

Ruby on Rails

First reported 12 years ago

2013-01-30 12:00:00

Last updated 5 years ago

2019-08-08 15:42:00

Affected Software

Ruby on Rails Rails 2.3.0

2.3.0

Ruby on Rails Rails 2.3.1

2.3.1

Ruby on Rails Rails 2.3.2

2.3.2

Ruby on Rails Rails 2.3.3

2.3.3

Ruby on Rails Rails 2.3.4

2.3.4

Ruby on Rails Rails 2.3.9

2.3.9

Ruby on Rails Rails 2.3.10

2.3.10

Ruby on Rails Rails 2.3.11

2.3.11

Ruby on Rails Rails 2.3.12

2.3.12

Ruby on Rails Rails 2.3.13

2.3.13

Ruby on Rails Rails 2.3.14

2.3.14

Ruby on Rails Rails 2.3.15

2.3.15

Ruby on Rails Rails 3.0.0 Beta

3.0.0

Ruby on Rails Rails 3.0.0 Beta 2

3.0.0

Ruby on Rails Rails 3.0.0 Beta 3

3.0.0

Ruby on Rails Rails 3.0.0 Beta 4

3.0.0

Ruby on Rails Rails 3.0.0 Release Candidate

3.0.0

Ruby on Rails Rails 3.0.0 Release Candidate 2

3.0.0

Ruby on Rails Rails 3.0.1

3.0.1

Ruby on Rails Rails 3.0.1 Pre

3.0.1

Ruby on Rails Rails 3.0.2

3.0.2

Ruby on Rails Rails 3.0.2 Pre

3.0.2

Ruby on Rails Rails 3.0.3

3.0.3

Ruby on Rails Rails 3.0.4 Release Candidate 1

3.0.4

Ruby on Rails Rails 3.0.5 Release Candidate 1

3.0.5

Ruby on Rails Rails 3.0.6 Release Candidate 1

3.0.6

Ruby on Rails Rails 3.0.6 Release Candidate 2

3.0.6

Ruby on Rails Rails 3.0.7 Release Candidate 1

3.0.7

Ruby on Rails Rails 3.0.7 Release Candidate 2

3.0.7

Ruby on Rails Rails 3.0.8 Release Candidate 1

3.0.8

Ruby on Rails Rails 3.0.8 Release Candidate 2

3.0.8

Ruby on Rails Rails 3.0.8 Release Candidate 3

3.0.8

Ruby on Rails Rails 3.0.8 Release Candidate 4

3.0.8

Ruby on Rails Rails 3.0.9 Release Candidate 1

3.0.9

Ruby on Rails Rails 3.0.9 Release Candidate 2

3.0.9

Ruby on Rails Rails 3.0.9 Release Candidate 3

3.0.9

Ruby on Rails Rails 3.0.9 Release Candidate 4

3.0.9

Ruby on Rails Rails 3.0.9 Release Candidate 5

3.0.9

Ruby on Rails Rails 3.0.10 Release Candidate 1

3.0.10

Ruby on Rails Rails 3.0.11

3.0.11

Ruby on Rails Rails 3.0.12 Release Candidate 1

3.0.12

Ruby on Rails Rails 3.0.13 Release Candidate 1

3.0.13

Ruby on Rails Rails 3.0.14

3.0.14

Ruby on Rails Rails 3.0.16

3.0.16

Ruby on Rails Rails 3.0.17

3.0.17

Ruby on Rails Rails 3.0.18

3.0.18

Ruby on Rails Rails 3.0.19

3.0.19

Ruby on Rails 3.0.4

3.0.4

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.