Miggo Logo

CVE-2013-0333: activesupport in Rails vulnerable to incorrect data conversion

7.5

CVSS Score

Basic Information

EPSS Score
0.99676%
Published
10/24/2017
Updated
8/25/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
activesupportrubygems>= 2.3.2, < 2.3.162.3.16
activesupportrubygems>= 3.0.0, < 3.0.203.0.20

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability explicitly references improper JSON-to-YAML conversion in lib/active_support/json/backends/yaml.rb. The YAML backend's decode method would have used YAML.load (instead of safe alternatives like YAML.safe_load), allowing arbitrary object deserialization. The Rails security announcement confirms the fix involved removing the YAML backend entirely, and the workaround suggests switching to the JSONGem backend, further implicating the YAML decoding logic as the vulnerable component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

`li*/**tiv*_support/json/***k*n*s/y*ml.r*` in Ru*y on R*ils *.*.x ***or* *.*.** *n* *.*.x ***or* *.*.** *o*s not prop*rly *onv*rt JSON **t* to Y*ML **t* *or pro**ssin* *y * Y*ML p*rs*r, w*i** *llows r*mot* *tt**k*rs to *x**ut* *r*itr*ry *o**, *on*u*t

Reasoning

T** vuln*r**ility *xpli*itly r***r*n**s improp*r JSON-to-Y*ML *onv*rsion in li*/**tiv*_support/json/***k*n*s/y*ml.r*. T** Y*ML ***k*n*'s ***o** m*t*o* woul* **v* us** Y*ML.lo** (inst*** o* s*** *lt*rn*tiv*s lik* Y*ML.s***_lo**), *llowin* *r*itr*ry o*