- Description
- The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
- Source
- secalert@redhat.com
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-264
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:john_nunemaker:crack:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "534E1684-91E9-4307-9023-B19A066AC21A",
"versionEndIncluding": "0.3.1"
},
{
"criteria": "cpe:2.3:a:john_nunemaker:crack:0.1.8:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "381F202C-AB3F-4A76-9D5B-C0431494A8B8"
},
{
"criteria": "cpe:2.3:a:john_nunemaker:crack:0.2.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D1A3F36D-003A-4EE5-BE26-9114B6319A36"
},
{
"criteria": "cpe:2.3:a:john_nunemaker:crack:0.3.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E7FB1D86-7E24-4AD9-8851-6A6FC8720E25"
}
],
"operator": "OR"
}
]
}
]