First published: Sun Jul 26 2015(Updated: )
The (1) `jdom.rb` and (2) `rexml.rb` components in Active Support in Ruby on Rails before 3.2.22, 4.1.x before 4.1.11, and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Ruby on Rails | =4.1.0 | |
Ruby on Rails | =4.1.1 | |
Ruby on Rails | =4.1.2 | |
Ruby on Rails | =4.1.3 | |
Ruby on Rails | =4.1.4 | |
Ruby on Rails | =4.1.5 | |
Ruby on Rails | =4.1.6 | |
Ruby on Rails | =4.1.7 | |
Ruby on Rails | =4.1.8 | |
Ruby on Rails | =4.2.0 | |
Ruby on Rails | =4.2.1 | |
rubygems/activesupport | <3.2.22 | 3.2.22 |
rubygems/activesupport | >=4.2.0.beta1<4.2.2 | 4.2.2 |
rubygems/activesupport | >=4.0.0.beta1<4.1.11 | 4.1.11 |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3227 is classified as a denial of service vulnerability that can lead to a SystemStackError.
To fix CVE-2015-3227, upgrade Ruby on Rails to version 4.1.11 or 4.2.2 and later.
CVE-2015-3227 affects Ruby on Rails versions prior to 4.1.11 and 4.2.x before 4.2.2.
Yes, CVE-2015-3227 can be exploited remotely by sending a large XML document that causes a denial of service.
The vulnerable components are jdom.rb and rexml.rb in the Active Support library.