First published: Tue Jun 09 2015(Updated: )
`The Moped::BSON::ObjecId.legal?` method in rubygem-moped before [commit dd5a7c14b5d2e466f7875d079af71ad19774609b](https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24) allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/moped | >=2.0.0<2.0.5 | 2.0.5 |
rubygems/moped | <1.5.3 | 1.5.3 |
Moped project Moped ruby | ||
Fedora | =21 | |
Fedora | =22 | |
Moped Project Moped |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4410 has been identified with a severity rating that may lead to denial of service attacks.
To fix CVE-2015-4410, upgrade the moped gem to version 2.0.5 or later or to version 1.5.3.
CVE-2015-4410 affects moped versions from 2.0.0 up to 2.0.5 and all versions below 1.5.3.
Software that relies on the moped gem within Ruby applications may be vulnerable to CVE-2015-4410.
Yes, CVE-2015-4410 can be present in Fedora versions 21 and 22 due to the inclusion of vulnerable moped versions.