Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBjaGMtOTQ5Zi01M201
Improper Input Validation in multi_xml
multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
Permalink: https://github.com/advisories/GHSA-pchc-949f-53m5JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBjaGMtOTQ5Zi01M201
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 7 years ago
Updated: about 1 year ago
Identifiers: GHSA-pchc-949f-53m5, CVE-2013-0175
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-0175
- https://github.com/sferik/multi_xml/pull/34
- https://groups.google.com/forum/?fromgroups=#!topic/ruby-grape/fthDkMgIOa0
- https://news.ycombinator.com/item?id=5040457
- https://www.openwall.com/lists/oss-security/2013/01/11/9
- https://github.com/sferik/multi_xml/commit/c94b136d06822514fc2e99dc851e6c4eeb4c8bdf
- https://github.com/advisories/GHSA-pchc-949f-53m5
Blast Radius: 0.0
Affected Packages
rubygems:multi_xml
Dependent packages: 293Dependent repositories: 102,860
Downloads: 407,349,612 total
Affected Version Ranges: < 0.5.2
Fixed in: 0.5.2
All affected versions: 0.0.1, 0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.2.0, 0.2.1, 0.2.2, 0.3.0, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 0.5.0, 0.5.1
All unaffected versions: 0.5.2, 0.5.3, 0.5.4, 0.5.5, 0.6.0, 0.7.0, 0.7.1