Rapid7 Vulnerability & Exploit Database

RHSA-2013:0201: rubygem-activesupport security update

Back to Search

RHSA-2013:0201: rubygem-activesupport security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
01/28/2013
Created
07/25/2018
Added
01/29/2013
Modified
07/04/2017

Description

Ruby on Rails is a model–view–controller (MVC) framework for webapplication development. Active Support provides support and utilityclasses used by the Ruby on Rails framework.A flaw was found in the way Active Support performed the parsing of JSONrequests by translating them to YAML. A remote attacker could use this flawto execute arbitrary code with the privileges of a Ruby on Railsapplication, perform SQL injection attacks, or bypass the authenticationusing a specially-created JSON request. (CVE-2013-0333)Red Hat would like to thank Ruby on Rails upstream for reporting thisissue. Upstream acknowledges Lawrence Pit of Mirror42 as the originalreporter.Users of Red Hat Subscription Asset Manager are advised to upgrade to thisupdated package, which resolves this issue. Katello must be restarted("service katello restart") for this update to take effect.

Solution(s)

  • redhat-upgrade-rubygem-activesupport

References

  • redhat-upgrade-rubygem-activesupport

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;