Rapid7 Vulnerability & Exploit Database

Ruby on Rails: Improper Input Validation (CVE-2013-1856)

Back to Search

Ruby on Rails: Improper Input Validation (CVE-2013-1856)

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:P)
Published
03/19/2013
Created
01/23/2020
Added
01/03/2020
Modified
01/03/2020

Description

The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference.

Solution(s)

  • ruby-on-rails-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;