Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTQ5MzYtcmoyNS02d202

nori contains Improper Input Validation

The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

Permalink: https://github.com/advisories/GHSA-4936-rj25-6wm6
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTQ5MzYtcmoyNS02d202
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 7 years ago
Updated: over 1 year ago


Identifiers: GHSA-4936-rj25-6wm6, CVE-2013-0285
References: Repository: https://github.com/savonrb/nori
Blast Radius: 0.0

Affected Packages

rubygems:nori
Dependent packages: 173
Dependent repositories: 7,179
Downloads: 100,645,850 total
Affected Version Ranges: >= 1.0.0, < 1.0.3, >= 1.1.0, < 1.1.4, >= 2.0.0, < 2.0.2
Fixed in: 1.0.3, 1.1.4, 2.0.2
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.1.2, 1.1.3, 2.0.0
All unaffected versions: 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 1.0.3, 1.1.4, 1.1.5, 2.0.3, 2.0.4, 2.1.0, 2.2.0, 2.3.0, 2.4.0, 2.5.0, 2.6.0, 2.7.0, 2.7.1