VYPR
High severityNVD Advisory· Published Jan 13, 2013· Updated Apr 29, 2026

CVE-2013-0156

CVE-2013-0156

Description

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
actionpackRubyGems
< 2.3.152.3.15
actionpackRubyGems
>= 3.0.0, < 3.0.193.0.19
actionpackRubyGems
>= 3.1.0, < 3.1.103.1.10
actionpackRubyGems
>= 3.2.0, < 3.2.113.2.11

Affected products

4
  • cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
    Range: >=3.2.0,<3.2.11
  • cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*
    Range: <2.3.15
  • cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

21

News mentions

0

No linked articles in our index yet.