vendor:
Ruby on Rails
by:
jjarmoc, egypt, lian
7,5
CVSS
HIGH
Code Execution
502
CWE
Product Name: Ruby on Rails
Affected Version From: 3.0.9
Affected Version To: 2.3.15
Patch Exists: YES
Related CWE: CVE-2013-0333
CPE: a:rubyonrails:ruby_on_rails
Metasploit:
https://www.rapid7.com/db/vulnerabilities/apple-osx-note-cve-2013-0333/, https://www.rapid7.com/db/vulnerabilities/apple-osx-podcastproducerserver-cve-2013-0333/, https://www.rapid7.com/db/vulnerabilities/apple-osx-ruby-cve-2013-0333/, https://www.rapid7.com/db/vulnerabilities/apple-osx-wikiserver-cve-2013-0333/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2013-0333/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2013-0333/, https://www.rapid7.com/db/vulnerabilities/ruby_on_rails-cve-2013-0333/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-0203/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-0201/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-0202/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ruby 1.9
2013
Ruby on Rails JSON Processor YAML Deserialization Code Execution
This module exploits a remote code execution vulnerability in the JSON request processor of the Ruby on Rails application framework. This vulnerability allows an attacker to instantiate a remote object, which in turn can be used to execute any ruby code remotely in the context of the application. This vulnerability is very similar to CVE-2013-0156.
Mitigation:
Upgrade to the latest version of Ruby on Rails