diff options
author | swills <swills@FreeBSD.org> | 2013-02-16 22:41:44 +0800 |
---|---|---|
committer | swills <swills@FreeBSD.org> | 2013-02-16 22:41:44 +0800 |
commit | 0918a53d716b8e429c9c6445901ce51b76895586 (patch) | |
tree | df5cc9dfed958f10f3c0f34cb3df184d7fad77f4 | |
parent | 1bfefac22a4c1a6250f2ecccc5c61ad35748d429 (diff) | |
download | freebsd-ports-gnome-0918a53d716b8e429c9c6445901ce51b76895586.tar.gz freebsd-ports-gnome-0918a53d716b8e429c9c6445901ce51b76895586.tar.zst freebsd-ports-gnome-0918a53d716b8e429c9c6445901ce51b76895586.zip |
- Document ruby json issue
-rw-r--r-- | security/vuxml/vuln.xml | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 3af7dfae389c..1e4da2cd0563 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,55 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="c79eb109-a754-45d7-b552-a42099eb2265"> + <topic>Ruby -- Denial of Service and Unsafe Object Creation Vulnerability in JSON</topic> + <affects> + <package> + <name>ruby</name> + <range><gt>1.9</gt></range> + <range><lt>1.9.3.385,1</lt></range> + </package> + <package> + <name>rubygem18-json</name> + <range><lt>1.7.7</lt></range> + </package> + <package> + <name>rubygem19-json</name> + <range><lt>1.7.7</lt></range> + </package> + <package> + <name>rubygem18-json_pure</name> + <range><lt>1.7.7</lt></range> + </package> + <package> + <name>rubygem19-json_pure</name> + <range><lt>1.7.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Aaron Patterson reports:</p> + <blockquote cite="https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/4_YvCpLzL58"> + <p>When parsing certain JSON documents, the JSON gem can be coerced in + to creating Ruby symbols in a target system. Since Ruby symbols + are not garbage collected, this can result in a denial of service + attack.</p> + <p>The same technique can be used to create objects in a target system + that act like internal objects. These "act alike" objects can be + used to bypass certain security mechanisms and can be used as a + spring board for SQL injection attacks in Ruby on Rails.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-0269</cvename> + </references> + <dates> + <discovery>2013-02-11</discovery> + <entry>2013-02-16</entry> + </dates> + </vuln> + <vuln vid="d3e96508-056b-4259-88ad-50dc8d1978a6"> <topic>Ruby -- XSS exploit of RDoc documentation generated by rdoc</topic> <affects> |