CVE-2013-1801:
HTTParty does not restrict casts of string values
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.8596%
CWE
Published
10/24/2017
Updated
11/10/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
httparty | rubygems | <= 0.9.0 | 0.10.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from HTTParty's YAML parsing implementation. The commit 53a8124 removed YAML support entirely by deleting: 1) MIME type mappings for YAML in SupportedFormats, 2) the yaml method that called YAML.load(body). YAML.load with untrusted input is known to be dangerous as it can instantiate arbitrary Ruby objects. The CVE description explicitly references YAML type conversion vulnerabilities, and the patch removes these YAML-handling functions, confirming their role in the vulnerability.