Quantcast
Channel: MALWARELIST INFORMATION ABOUT VIRUSES » Ruby on Rails
Viewing all articles
Browse latest Browse all 4

Execution of arbitrary code in Ruby on Rails

$
0
0
Vulnerability

Execution of arbitrary code

Ruby on Rails JSON Processor YAML Deserialization Code Execution

Vulnerability: Execution of arbitrary code in Ruby on Rails

Danger: High
Patch: Yes
Number of vulnerabilities: 1

CVE ID: CVE-2013-0333
Vector of operation: Remote
Impact: System Compromise

Be exploited: PoC code
Affected Products: Ruby on Rails 2.3.x, Ruby on Rails 3.0.x

Affected versions: Ruby on Rails versions prior to 3.0.20 and 2.3.16.

Description:

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability is caused due to input validation error in the method “convert_json_to_yaml ()” in the JSON Parser during decoding YAML data. A remote user can execute arbitrary code on the target system.

Manufacturer URL: http://rubyonrails.org/

Solution: Update to version 3.0.20 or 2.3.16 from the manufacturer.

links:

http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/


Filed under: Vulnerabilities

Viewing all articles
Browse latest Browse all 4

Trending Articles