Rapid7 Vulnerability & Exploit Database

RHSA-2013:0154: Ruby on Rails security update

Back to Search

RHSA-2013:0154: Ruby on Rails security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
01/03/2013
Created
07/25/2018
Added
01/14/2013
Modified
07/04/2017

Description

Ruby on Rails is a model–view–controller (MVC) framework for webapplication development. Action Pack implements the controller and the viewcomponents. Active Record implements object-relational mapping foraccessing database entries using objects. Active Support provides supportand utility classes used by the Ruby on Rails framework.Multiple flaws were found in the way Ruby on Rails performed XML parameterparsing in HTTP requests. A remote attacker could use these flaws toexecute arbitrary code with the privileges of a Ruby on Rails application,perform SQL injection attacks, or bypass the authentication using aspecially-created HTTP request. (CVE-2013-0156)Red Hat is aware that a public exploit for the CVE-2013-0156 issues isavailable that allows remote code execution in applications using Ruby onRails.Multiple input validation vulnerabilities were discovered inrubygem-activerecord. A remote attacker could possibly use these flaws toperform an SQL injection attack against an application usingrubygem-activerecord. (CVE-2012-2661, CVE-2012-2695, CVE-2012-6496,CVE-2013-0155)Multiple input validation vulnerabilities were discovered inrubygem-actionpack. A remote attacker could possibly use these flaws toperform an SQL injection attack against an application usingrubygem-actionpack and rubygem-activerecord. (CVE-2012-2660, CVE-2012-2694)Multiple cross-site scripting (XSS) flaws were found in rubygem-actionpack.A remote attacker could use these flaws to conduct XSS attacks againstusers of an application using rubygem-actionpack. (CVE-2012-3463,CVE-2012-3464, CVE-2012-3465)A flaw was found in the HTTP digest authentication implementation inrubygem-actionpack. A remote attacker could use this flaw to cause adenial of service of an application using rubygem-actionpack and digestauthentication. (CVE-2012-3424)Users are advised to upgrade to these updated rubygem-actionpack,rubygem-activesupport, and rubygem-activerecord packages, which resolvethese issues. Katello must be restarted ("service katello restart") forthis update to take effect.

Solution(s)

  • redhat-upgrade-rubygem-actionpack
  • redhat-upgrade-rubygem-activerecord
  • redhat-upgrade-rubygem-activesupport

References

  • redhat-upgrade-rubygem-actionpack
  • redhat-upgrade-rubygem-activerecord
  • redhat-upgrade-rubygem-activesupport

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;