Vulnerability Details CVE-2013-1802
The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.017
EPSS Ranking 81.4%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2013-1802
-
cpe:2.3:a:dan_kubb:extlib:0.9.10
-
cpe:2.3:a:dan_kubb:extlib:0.9.11
-
cpe:2.3:a:dan_kubb:extlib:0.9.12
-
cpe:2.3:a:dan_kubb:extlib:0.9.13
-
cpe:2.3:a:dan_kubb:extlib:0.9.14
-
cpe:2.3:a:dan_kubb:extlib:0.9.15
-
cpe:2.3:a:dan_kubb:extlib:0.9.2
-
cpe:2.3:a:dan_kubb:extlib:0.9.3
-
cpe:2.3:a:dan_kubb:extlib:0.9.4
-
cpe:2.3:a:dan_kubb:extlib:0.9.5
-
cpe:2.3:a:dan_kubb:extlib:0.9.6
-
cpe:2.3:a:dan_kubb:extlib:0.9.7
-
cpe:2.3:a:dan_kubb:extlib:0.9.8
-
cpe:2.3:a:dan_kubb:extlib:0.9.9