Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2013-0333Deserialization of Untrusted Data in Rails

Severity
7.5HIGHNVD
EPSS
91.9%
top 0.30%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 30
Latest updateOct 24

Description

lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

Debianrubyonrails/rails< 2.3.14.1+3
NVDrubyonrails/rails31 versions+30

🔴Vulnerability Details

4
OSV
activesupport in Rails vulnerable to incorrect data conversion2017-10-24
GHSA
activesupport in Rails vulnerable to incorrect data conversion2017-10-24
OSV
CVE-2013-0333: lib/active_support/json/backends/yaml2013-01-30
CVEList
CVE-2013-0333: lib/active_support/json/backends/yaml2013-01-30

💥Exploits & PoCs

1
Exploit-DB
Ruby on Rails - JSON Processor YAML Deserialization Code Execution (Metasploit)2013-01-29

📋Vendor Advisories

2
Red Hat
rubygem-activesupport: json to yaml parsing2013-01-28
Debian
CVE-2013-0333: rails - lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 an...2013

💬Community

5
Bugzilla
CVE-2013-0333 rubygem-activesupport: json to yaml parsing [fedora-16]2013-01-29
Bugzilla
CVE-2013-0333 rubygem-activesupport: json to yaml parsing [epel-5]2013-01-29
Bugzilla
CVE-2013-0333 rubygem-activesupport: json to yaml parsing [fedora-17]2013-01-29
Bugzilla
CVE-2013-0333 rubygem-activesupport: json to yaml parsing [epel-6]2013-01-29
Bugzilla
CVE-2013-0333 rubygem-activesupport: json to yaml parsing2013-01-24
CVE-2013-0333 — Deserialization of Untrusted Data | cvebase