CVE-2013-0333: activesupport in Rails vulnerable to incorrect data conversion
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99676%
CWE
Published
10/24/2017
Updated
8/25/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
activesupport | rubygems | >= 2.3.2, < 2.3.16 | 2.3.16 |
activesupport | rubygems | >= 3.0.0, < 3.0.20 | 3.0.20 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability explicitly references improper JSON-to-YAML conversion in lib/active_support/json/backends/yaml.rb. The YAML backend's decode method would have used YAML.load (instead of safe alternatives like YAML.safe_load), allowing arbitrary object deserialization. The Rails security announcement confirms the fix involved removing the YAML backend entirely, and the workaround suggests switching to the JSONGem backend, further implicating the YAML decoding logic as the vulnerable component.