Miggo Logo

CVE-2013-1801:
HTTParty does not restrict casts of string values

7.5

CVSS Score

Basic Information

EPSS Score
0.8596%
Published
10/24/2017
Updated
11/10/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
httpartyrubygems<= 0.9.00.10.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from HTTParty's YAML parsing implementation. The commit 53a8124 removed YAML support entirely by deleting: 1) MIME type mappings for YAML in SupportedFormats, 2) the yaml method that called YAML.load(body). YAML.load with untrusted input is known to be dangerous as it can instantiate arbitrary Ruby objects. The CVE description explicitly references YAML type conversion vulnerabilities, and the patch removes these YAML-handling functions, confirming their role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** *ttp*rty **m *.*.* *n* **rli*r *or Ru*y *o*s not prop*rly r*stri*t **sts o* strin* v*lu*s, w*i** mi**t *llow r*mot* *tt**k*rs to *on*u*t o*j**t-inj**tion *tt**ks *n* *x**ut* *r*itr*ry *o**, or **us* * **ni*l o* s*rvi** (m*mory *n* *PU *onsumption

Reasoning

T** vuln*r**ility st*mm** *rom *TTP*rty's Y*ML p*rsin* impl*m*nt*tion. T** *ommit ******* r*mov** Y*ML support *ntir*ly *y **l*tin*: *) MIM* typ* m*ppin*s *or Y*ML in Support***orm*ts, *) t** y*ml m*t*o* t**t **ll** Y*ML.lo**(*o*y). Y*ML.lo** wit* un