CVE Vulnerabilities

CVE-2013-1802

Published: Apr 09, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Affected Software

NameVendorStart VersionEnd Version
ExtlibDan_kubb*0.9.15 (including)
ExtlibDan_kubb0.9.2 (including)0.9.2 (including)
ExtlibDan_kubb0.9.3 (including)0.9.3 (including)
ExtlibDan_kubb0.9.4 (including)0.9.4 (including)
ExtlibDan_kubb0.9.5 (including)0.9.5 (including)
ExtlibDan_kubb0.9.6 (including)0.9.6 (including)
ExtlibDan_kubb0.9.7 (including)0.9.7 (including)
ExtlibDan_kubb0.9.8 (including)0.9.8 (including)
ExtlibDan_kubb0.9.9 (including)0.9.9 (including)
ExtlibDan_kubb0.9.10 (including)0.9.10 (including)
ExtlibDan_kubb0.9.11 (including)0.9.11 (including)
ExtlibDan_kubb0.9.12 (including)0.9.12 (including)
ExtlibDan_kubb0.9.13 (including)0.9.13 (including)
ExtlibDan_kubb0.9.14 (including)0.9.14 (including)
Libextlib-rubyUbuntulucid*
Libextlib-rubyUbuntuoneiric*
Libextlib-rubyUbuntuprecise*
Libextlib-rubyUbuntuupstream*
Ruby-extlibUbuntuquantal*
Ruby-extlibUbuntuupstream*

References