First published: Tue Jan 08 2013(Updated: )
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rubygem-actionpack | <1:3.0.10-11.el6cf | 1:3.0.10-11.el6cf |
redhat/rubygem-activerecord | <1:3.0.10-8.el6cf | 1:3.0.10-8.el6cf |
redhat/rubygem-activesupport | <1:3.0.10-5.el6cf | 1:3.0.10-5.el6cf |
redhat/ruby193-rubygem-actionpack | <1:3.2.8-2.el6 | 1:3.2.8-2.el6 |
redhat/ruby193-rubygem-activesupport | <1:3.2.8-3.el6 | 1:3.2.8-3.el6 |
redhat/rubygem-actionpack | <1:3.0.13-2.1.el6 | 1:3.0.13-2.1.el6 |
redhat/rubygem-activesupport | <1:3.0.13-2.el6 | 1:3.0.13-2.el6 |
Rubyonrails Rails | >=3.2.0<3.2.11 | |
Rubyonrails Ruby On Rails | <2.3.15 | |
Rubyonrails Ruby On Rails | >=3.0.0<3.0.19 | |
Rubyonrails Ruby On Rails | >=3.1.0<3.1.10 | |
Debian Debian Linux | =6.0 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)