Show plain JSON{"id": "CVE-2013-1856", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-03-19T22:55:01.070", "references": [{"url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html", "source": "secalert@redhat.com"}, {"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html", "source": "secalert@redhat.com"}, {"url": "http://support.apple.com/kb/HT5784", "source": "secalert@redhat.com"}, {"url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/", "source": "secalert@redhat.com"}, {"url": "https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source&output=gplain", "source": "secalert@redhat.com"}, {"url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://support.apple.com/kb/HT5784", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source&output=gplain", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference."}, {"lang": "es", "value": "El backend ActiveSupport::XmlMini_JDOM en lib/active_support/xml_mini/jdom.rb en el componente Active Support en Ruby on Rails v3.0.x y 3.1.x anterior a v3.1.12 y v3.2.x anterior a v3.2.13, cuando se usa JRuby, no restringe adecuadamente las capacidades del validador XML, lo que permite a atacantes remotos leer archivos de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (consumo de recursos) a trav\u00e9s de vectores que involucran (1) una TDT externa o (2) una declaraci\u00f3n de entidad externa junto con una referencia a una entidad."}], "lastModified": "2024-11-21T01:50:31.833", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F884F2F4-94F3-46CB-860B-1BCC0EEF408A"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88DFBB48-1C29-4639-9369-F5B413CA2337"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D37696D7-BEE6-4587-9E33-A7FE24780409"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3172982-3FA4-427F-BE3E-2321D804E49D"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD6EC85B-F092-48FF-966A-96B9227C8656"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9000F3C1-57A0-474C-9C82-E58688F29838"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A42F4E7A-6F6A-485C-8D30-95F3B0285922"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30B9C0CB-F6E6-4233-84E4-D6E69104DD73"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5343241F-274D-45FF-97C7-2BC2E920BAF0"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FED122B8-AF4C-4C48-B1E5-54F4A7A31A53"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "157ACCAD-0FB8-4CC9-9DFB-70835DE6506C"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E50ACF6-7277-4C9A-B42A-E7EFDC317691"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C191DC2B-1EC3-48E0-A586-867E6EE4431C"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AA51263-6680-42C6-B119-8241D6F76206"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4BC41E8-FEDA-4C31-B479-D49A59FC4D63"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09C20971-53B5-43B0-AC45-5AA0FDF1B054"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "496902D6-409A-40D9-849F-C41264BE5B04"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2482AB3F-8303-4F95-BE04-C5F06EEF2015"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "244C6952-377C-4AF0-8BA2-C34516A3EB5A"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98A79CC5-71EC-4E90-9E99-2DF62ABC0122"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6562F3C3-D794-4107-95D4-1C0B0486940B"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2816C02C-E13E-4367-91F3-14756A90EC9E"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AE674DE-65DB-437E-A034-A2EE5C584B33"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32EB2C3F-0F24-43DB-988E-BD2973598F71"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB32713D-FE64-445E-872E-B4678C243AB1"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89C618DC-38BC-4484-8C41-BC38B7EB636B"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E376782-98B0-4766-B6FC-67E032A00C62"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96D08DC1-14E9-4DB9-BC95-3F73B454FBC4"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F365C9E5-27DC-46C3-AFE4-4876EC7B352B"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F0016A6-0ED6-443D-B969-CB1226D8E28C"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E69470EA-5EBC-4FB9-A722-5B61C70C1140"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B13A8EBB-4211-4AB1-8872-244EEEE20ABD"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9AB2152-DED8-4CFD-B915-94A9F56FDD05"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C630AB60-DBAF-421E-B663-492BAE8A180F"}, {"criteria": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F41CCF8-14EB-4327-A675-83BFDBB53196"}, {"criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8F0635C-4EBF-4EA3-9756-A85A3BB5026B"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}