High severityNVD Advisory· Published Jan 30, 2013· Updated Apr 29, 2026
CVE-2013-0333
CVE-2013-0333
Description
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
activesupportRubyGems | >= 2.3.2, < 2.3.16 | 2.3.16 |
activesupportRubyGems | >= 3.0.0, < 3.0.20 | 3.0.20 |
Affected products
57cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*+ 55 more
- cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- github.com/advisories/GHSA-xgr2-v94m-rc9gghsaADVISORY
- groups.google.com/group/rubyonrails-security/msg/52179af76915e518nvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2013-0333ghsaADVISORY
- lists.apple.com/archives/security-announce/2013/Jun/msg00000.htmlnvdWEB
- lists.apple.com/archives/security-announce/2013/Mar/msg00002.htmlnvdWEB
- rhn.redhat.com/errata/RHSA-2013-0201.htmlnvdWEB
- rhn.redhat.com/errata/RHSA-2013-0202.htmlnvdWEB
- rhn.redhat.com/errata/RHSA-2013-0203.htmlnvdWEB
- support.apple.com/kb/HT5784nvdWEB
- weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-releasedghsaWEB
- www.debian.org/security/2013/dsa-2613nvdWEB
- www.kb.cert.org/vuls/id/628463nvdUS Government ResourceWEB
- access.redhat.com/errata/RHSA-2013:0201ghsaWEB
- access.redhat.com/errata/RHSA-2013:0202ghsaWEB
- access.redhat.com/errata/RHSA-2013:0203ghsaWEB
- access.redhat.com/security/cve/CVE-2013-0333ghsaWEB
- bugzilla.redhat.com/show_bug.cgighsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2013-0333.ymlghsaWEB
- groups.google.com/forum/ghsaWEB
- puppet.com/security/cve/cve-2013-0333nvdWEB
- weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/nvd
News mentions
0No linked articles in our index yet.