Vulnerability CVE-2013-0175


Published: 2013-04-25   Modified: 2013-04-26

Description:
multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Grape project -> Grape 
Erik michaels-ober -> Multi xml 

 References:
http://www.openwall.com/lists/oss-security/2013/01/11/9
https://gist.github.com/nate/d7f6d9f4925f413621aa
https://github.com/sferik/multi_xml/pull/34
https://groups.google.com/forum/?fromgroups=#!topic/ruby-grape/fthDkMgIOa0
https://news.ycombinator.com/item?id=5040457

Copyright 2024, cxsecurity.com

 

Back to Top