'; } else{ echo ''; } echo '
|
|||
Release Date:2025/9/15
Rule Name:CVE-2013-0333: WEB Ruby on Rails JSON Processor YAML Deserialization Code Execution
Severity:high
CVE ID:CVE-2013-0333
Descripiton:
|
Ruby on Rails, or simply Rails, is a server-side Web Application framework written by Ruby. Rails is a model-view-controller (MVC) framework, providing default structures for a database, a Web service, and Web pages. It encourages and facilitates the use of Web standards such as JSON or XML for data transfer, and HTML, CSS and JavaScript for display and user interfacing. Lib/active_support/json/backends/yaml.rb in Rails 2.3.x before 2.3.15 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding. This rule supports to defend the A6: Vulnerable and Outdated Components and A8: Software and Data Integrity Failures of OWASP Top 10 - 2021.
Other reference:None
Solution:
|
Update vendor patches.