HIGH · 7.5

CVE-2013-0175

multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection at...

Vulnerability Description

multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
Erik Michaels-OberMulti Xml0.5.2
Ruby-LangRubyAll versions
Grape ProjectGrape0.1.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-0175?

CVE-2013-0175 is a vulnerability with a CVSS score of 7.5 (HIGH). multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection at...

How severe is CVE-2013-0175?

CVE-2013-0175 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-0175?

Check the references section above for vendor advisories and patch information. Affected products include: Erik Michaels-Ober Multi Xml, Ruby-Lang Ruby, Grape Project Grape.