First published: Thu Apr 25 2013(Updated: )
Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/devise | >=1.5.0<1.5.4 | 1.5.4 |
rubygems/devise | >=2.0.0<2.0.5 | 2.0.5 |
rubygems/devise | >=2.1.0<2.1.3 | 2.1.3 |
rubygems/devise | >=2.2.0<2.2.3 | 2.2.3 |
Devise | =1.5.0 | |
Devise | =1.5.1 | |
Devise | =1.5.2 | |
Devise | =1.5.3 | |
Devise | =2.0.0 | |
Devise | =2.0.1 | |
Devise | =2.0.2 | |
Devise | =2.0.3 | |
Devise | =2.0.4 | |
Devise | =2.1.0 | |
Devise | =2.1.1 | |
Devise | =2.1.2 | |
Devise | =2.2.0 | |
Devise | =2.2.1 | |
Devise | =2.2.2 | |
Ruby | ||
SUSE Linux | =12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0233 is considered a moderate severity vulnerability due to its potential to cause incorrect query results and bypass security checks.
To fix CVE-2013-0233, update the Devise gem to version 1.5.4, 2.0.5, 2.1.3, or 2.2.3.
CVE-2013-0233 affects Devise versions prior to 2.2.3, 2.1.3, 2.0.5, and 1.5.4, particularly when using certain databases.
If you are using Devise version 2.2.3 or later, your installation is not vulnerable to CVE-2013-0233.
Attackers can exploit CVE-2013-0233 to manipulate database queries, causing incorrect results and potentially bypassing authentication checks.