Loading HuntDB...

CVE-2013-0269

UNKNOWN
Published 2013-02-13T01:00:00
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2013-0269. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

JSON gem has Improper Input Validation vulnerability

GHSA-x457-cw4h-hq5f

Advisory Details

The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."

Affected Packages

RubyGems json
ECOSYSTEM: ≥0 <1.5.5
RubyGems json
ECOSYSTEM: ≥1.6.0 <1.6.8
RubyGems json
ECOSYSTEM: ≥1.7.0 <1.7.7

CVSS Scoring

CVSS Score

7.5

References

Advisory provided by GitHub Security Advisory Database. Published: October 24, 2017, Modified: June 1, 2023

References

HackerOne Reports

Published: 2013-02-13T01:00:00
Last Modified: 2024-08-06T14:18:09.563Z
Copied to clipboard!