CVE-2013-0269
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
13/02/2013
Last modified:
11/04/2025
Description
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:rubygems:json_gem:1.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.5.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.6.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.6.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.6.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.6.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.6.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubygems:json_gem:1.7.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html
- http://rhn.redhat.com/errata/RHSA-2013-0686.html
- http://rhn.redhat.com/errata/RHSA-2013-0701.html
- http://rhn.redhat.com/errata/RHSA-2013-1028.html
- http://rhn.redhat.com/errata/RHSA-2013-1147.html
- http://secunia.com/advisories/52075
- http://secunia.com/advisories/52774
- http://secunia.com/advisories/52902
- http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
- http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/
- http://www.openwall.com/lists/oss-security/2013/02/11/7
- http://www.openwall.com/lists/oss-security/2013/02/11/8
- http://www.osvdb.org/90074
- http://www.securityfocus.com/bid/57899
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862
- http://www.ubuntu.com/usn/USN-1733-1
- http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection
- https://exchange.xforce.ibmcloud.com/vulnerabilities/82010
- https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain
- https://puppet.com/security/cve/cve-2013-0269
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html
- http://rhn.redhat.com/errata/RHSA-2013-0686.html
- http://rhn.redhat.com/errata/RHSA-2013-0701.html
- http://rhn.redhat.com/errata/RHSA-2013-1028.html
- http://rhn.redhat.com/errata/RHSA-2013-1147.html
- http://secunia.com/advisories/52075
- http://secunia.com/advisories/52774
- http://secunia.com/advisories/52902
- http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
- http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/
- http://www.openwall.com/lists/oss-security/2013/02/11/7
- http://www.openwall.com/lists/oss-security/2013/02/11/8
- http://www.osvdb.org/90074
- http://www.securityfocus.com/bid/57899
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862
- http://www.ubuntu.com/usn/USN-1733-1
- http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection
- https://exchange.xforce.ibmcloud.com/vulnerabilities/82010
- https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain
- https://puppet.com/security/cve/cve-2013-0269