CVE Vulnerabilities

CVE-2013-0333

Published: Jan 30, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
7.5 CRITICAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

Affected Software

NameVendorStart VersionEnd Version
RailsRubyonrails2.3.0 (including)2.3.0 (including)
RailsRubyonrails2.3.1 (including)2.3.1 (including)
RailsRubyonrails2.3.2 (including)2.3.2 (including)
RailsRubyonrails2.3.3 (including)2.3.3 (including)
RailsRubyonrails2.3.4 (including)2.3.4 (including)
RailsRubyonrails2.3.9 (including)2.3.9 (including)
RailsRubyonrails2.3.10 (including)2.3.10 (including)
RailsRubyonrails2.3.11 (including)2.3.11 (including)
RailsRubyonrails2.3.12 (including)2.3.12 (including)
RailsRubyonrails2.3.13 (including)2.3.13 (including)
RailsRubyonrails2.3.14 (including)2.3.14 (including)
RailsRubyonrails2.3.15 (including)2.3.15 (including)
CloudForms for RHEL 6RedHatkatello-0:1.1.12.1-1.el6cf*
CloudForms for RHEL 6RedHatrubygem-activesupport-1:3.0.10-9.el6cf*
Red Hat Subscription Asset Manager 1.1RedHatrubygem-activesupport-1:3.0.10-7.el6cf*
RHEL 6 Version of OpenShift EnterpriseRedHatrubygem-activesupport-1:3.0.13-4.el6op*
RailsUbuntuhardy*
RailsUbuntulucid*
Ruby-activesupport-2.3Ubuntuoneiric*
Ruby-activesupport-2.3Ubuntuprecise*
Ruby-activesupport-2.3Ubuntuquantal*
Ruby-activesupport-2.3Ubuntuupstream*

References