CVE-2013-0269
Published: 12 February 2013
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
Notes
Author | Note |
---|---|
seth-arnold | 1.7 patch was updated, see second Google groups reference, the upstream patch URL given here is the updated patch. |
Priority
Status
Package | Release | Status |
---|---|---|
ruby-json Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Not vulnerable
(1.8.0-1)
|
|
trusty |
Not vulnerable
(1.8.0-1)
|
|
upstream |
Released
(1.7.7, 1.6.8, 1.5.5)
|
|
utopic |
Not vulnerable
(1.8.0-1)
|
|
vivid |
Not vulnerable
(1.8.0-1)
|
|
wily |
Not vulnerable
(1.8.0-1)
|
|
xenial |
Not vulnerable
(1.8.0-1)
|
|
yakkety |
Not vulnerable
(1.8.0-1)
|
|
zesty |
Not vulnerable
(1.8.0-1)
|
|
Patches: upstream: https://groups.google.com/group/rubyonrails-security/attach/d8e0db6e08c81428/1-5-denial-of-service.patch?part=3 upstream: https://groups.google.com/group/rubyonrails-security/attach/d8e0db6e08c81428/1-6-denial-of-service.patch?part=4 upstream: https://groups.google.com/group/rubyonrails-security/attach/e4682a2dffd54df2/0001-Security-fix-create_additons-JSON-GenericObject.patch?part=3 |
||
ruby1.9.1 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Released
(1.9.3.0-1ubuntu2.5)
|
|
quantal |
Released
(1.9.3.194-1ubuntu1.3)
|
|
raring |
Released
(1.9.3.194-7ubuntu1)
|
|
saucy |
Released
(1.9.3.194-7ubuntu1)
|
|
trusty |
Released
(1.9.3.194-7ubuntu1)
|
|
upstream |
Released
(1.9.3.194-7)
|
|
utopic |
Released
(1.9.3.194-7ubuntu1)
|
|
vivid |
Released
(1.9.3.194-7ubuntu1)
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: vendor: http://patch-tracker.debian.org/patch/series/view/ruby1.9.1/1.9.3.194-7/CVE-2013-0269.patch |