Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2013-1855
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:35.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2013-10-22-5", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html" }, { "name": "[rubyonrails-security] 20130318 [CVE-2013-1855] XSS vulnerability in sanitize_css in Action Pack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain" }, { "name": "openSUSE-SU-2014:0019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html" }, { "name": "openSUSE-SU-2013:0662", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5784" }, { "name": "RHSA-2013:0698", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html" }, { "name": "APPLE-SA-2013-06-04-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "name": "openSUSE-SU-2013:0661", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html" }, { "name": "RHSA-2014:1863", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-12-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "APPLE-SA-2013-10-22-5", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html" }, { "name": "[rubyonrails-security] 20130318 [CVE-2013-1855] XSS vulnerability in sanitize_css in Action Pack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain" }, { "name": "openSUSE-SU-2014:0019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html" }, { "name": "openSUSE-SU-2013:0662", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5784" }, { "name": "RHSA-2013:0698", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html" }, { "name": "APPLE-SA-2013-06-04-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "name": "openSUSE-SU-2013:0661", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html" }, { "name": "RHSA-2014:1863", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1855", "datePublished": "2013-03-19T22:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:35.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-1855\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-03-19T22:55:01.027\",\"lastModified\":\"2024-11-21T01:50:31.663\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\\\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.\"},{\"lang\":\"es\",\"value\":\"El m\u00e9todo sanitize_css en lib/action_controller/vendor/html-scanner/html/sanitizer.rb en el componente Action Pack en Ruby on Rails anterior a v2.3.18, v3.0.x y v3.1.x anterior a v3.1.12, y v3.2.x anterior a v3.2.13, no menaja adecuadamente los caracteres \\\\n (nueva l\u00ednea), lo que facilita a atacantes remotos llevar a cabo ataques XSS a trav\u00e9s de secuencias CSS.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2816C02C-E13E-4367-91F3-14756A90EC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E82AF7C7-B725-40EF-8EE3-18F8E7FAEB29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE674DE-65DB-437E-A034-A2EE5C584B33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0524F3E3-BAD7-4CD3-A6E7-74CFBE4B46E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EB2C3F-0F24-43DB-988E-BD2973598F71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB32713D-FE64-445E-872E-B4678C243AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C55E6B4A-2B9C-46C8-A739-109EA4BA7FD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"89C618DC-38BC-4484-8C41-BC38B7EB636B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE1EF01A-F358-45D3-ADA2-51DD1D8CB6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC2616BD-A4E8-42F3-BB5A-7517DC4EDA3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E376782-98B0-4766-B6FC-67E032A00C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96D08DC1-14E9-4DB9-BC95-3F73B454FBC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F365C9E5-27DC-46C3-AFE4-4876EC7B352B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F0016A6-0ED6-443D-B969-CB1226D8E28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E69470EA-5EBC-4FB9-A722-5B61C70C1140\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13A8EBB-4211-4AB1-8872-244EEEE20ABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9AB2152-DED8-4CFD-B915-94A9F56FDD05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C630AB60-DBAF-421E-B663-492BAE8A180F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F41CCF8-14EB-4327-A675-83BFDBB53196\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49B9DD7F-DA3A-49C5-B2D4-8A8BD73C6FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB938651-C874-4427-AF9B-E9564B258633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D59FAFB-5D48-4BD8-AD51-FF9A204E373D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE23CCE1-1713-4813-A0AB-1E10DBDA4D12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"897109FF-2C37-458A-91A9-7407F3DFBC99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"289B1633-AAF7-48BE-9A71-0577428EE531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B947FD6D-CD0B-44EE-95B5-E513AF244905\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3666B82-1880-4A43-900F-3656F3FB157A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE622F6D-AC7D-4D82-A33C-82C2CEFDB9B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06D18BA-A0AB-461B-B498-2F1759CBF37D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61EBE7E0-C474-43A7-85E3-093C754A253F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7195418-A2E9-43E6-B29F-AEACC317E69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39485B13-3C71-4EC6-97CF-6C796650C5B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E16D8B-4FBD-4FB6-ABA8-B38ECA4D413F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8A3B30A-65F0-4D63-9A09-B23E9FC8D550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62323F62-AD04-4F43-A566-718DDB4149CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8E890B1-4237-4470-939A-4FC489E04520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24F3B933-0F68-4F88-999C-0BE48BC88CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E13DAEA-F118-4CB2-88A5-54E3327B6B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC33BF68-D887-4C67-8E8C-D2A6CD877FB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BFCB88D-D946-4510-8DDC-67C32A606589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E793287E-2BDA-4012-86F5-886B82510431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF706143-996C-4120-B620-3EDC977568DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E7F32B-C760-4862-B6DB-C38FB2A9182F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD68A034-73A2-4B1A-95DB-19AD3131F775\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E78C912-E8FF-495F-B922-43C54D1E2180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B72C17-82C3-4930-9227-226C8E64C2E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA59F311-B2B4-40EE-A878-64EF9F41581B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"035B47E9-A395-47D2-9164-A2A2CF878326\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDA55D29-C830-45EF-A3B3-BFA9EED88F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A9356A6-D32A-487C-B743-1DA0D6C42FA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3C7616-8631-49AC-979C-4347067059AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC487B78-AAEA-4F0E-8C8B-F415013A381E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50EEAFDA-7782-4E1E-9058-205AD4BE9A01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC748BB-BFC5-44F7-B633-CEEBB1279889\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"38CF2C31-70BB-41D3-9462-0A8B9869A5F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8584B37-7950-4C89-83D2-04E1ACDC60BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CB26F65-5CFB-4BF8-BCC4-679327D4A8DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF12EA5D-5EB5-46A8-AC60-65B327D610AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B4B121-94BD-4E0F-8860-6239890043B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63CF211C-683E-4F7D-8C62-05B153AC1960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"456A2F7E-CC66-48C4-B028-353D2976837A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B1CDAFA-2AC6-4C46-9E65-0BE9127E770F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9806A84-2160-40EA-9960-AE7756CE4E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07EC67D4-3D0F-4FF9-8197-71175DCB2723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CEB24FC-F068-4EBD-BDC8-AB5BC56130DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E2DF384-3992-43BF-8A5C-65FA53E9A77C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1467583-23E9-4E2B-982D-80A356174BB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC784C0-5618-4C32-8C17-BE7041656E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB9ABB5-1F78-4CF0-BA82-7833E0F7A56E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3ED96F-3EA4-4E47-A559-9DF9A7D3DDE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B38EAA4-E948-45A7-B6E5-7214F2B545E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECC8C49-5A46-4D23-81F9-8243F5D508DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"312848C5-BA35-4A48-B66D-195A5E1CD00F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7453BE5-91C8-42B2-9F75-FFE4038F29A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2FD44EB-E899-4FA8-985E-44B75134DDC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E13E309-2411-4E1D-B27F-BF5DDDD5D5C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E1C795F-CCAC-47AC-B809-BD5510310011\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.3.17\",\"matchCriteriaId\":\"C230384C-A52A-4167-A07D-0E06138EE246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04FDC63D-6ED7-48AE-9D72-6419F54D4B84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBF12B2F-39D9-48D5-9620-DF378D199295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E1EAAF-7B49-498B-BFEB-357173824F4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9AD626-0AFA-4873-A701-C7716193A69C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF69F60A-E8D3-4A4D-BBB5-DE42A1402262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"986D2B30-FF07-498B-A5E0-A77BAB402619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E3141A-162C-4674-BD7B-E1539BAA0B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E73F12-0551-42D2-ACC3-223C98B69C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6BA0659-2287-4E95-B30D-2441CD96DA90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B01A4699-32D3-459E-B731-4240C8157F71\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3BE7DFE-BA20-434B-A1DE-AD038B255C60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCEE5B21-C990-4705-8239-0D7B29DAEDA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"65EE33B1-B079-4CDE-B9C2-F1613A4610DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CAAA20B-824F-4448-99DC-9712FE628073\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2BEBDFB-0F30-454A-B74C-F820C9D2708B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D7CD8C1-95D1-477E-AD96-6582EC33BA01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F00D98-3D0F-40AF-AE4F-090B1E6B660C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9476CE55-69C0-45D3-B723-6F459C90BF05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*\",\"matchCriteriaId\":\"486F5BA6-BCF7-4691-9754-19D364B4438D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"112FC73B-A8BC-4EEA-9F4B-CCE685EF2838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4498383-6FCA-4E17-A1FD-B0CE7EE50F85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26565B1-2BA6-4A3C-9264-7FC9A1820B59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"644EF85E-6D3E-4F5C-96B0-49AD2A2D90CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392E2D58-CB39-4832-B4D9-9C2E23B8E14C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F2466EA-7039-46A1-B4A3-8DACD1953A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CAB4E72-0A15-4B26-9B69-074C278568D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A085E105-9375-440A-80CB-9B23E6D7EB4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"25911E48-C5D7-4ED8-B4DB-7523A74CCF49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE6EC1E5-3A4A-4751-9F77-28EF5AF681E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B29674E3-CC80-446B-9A43-82594AE7A058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF34D8CB-2B6D-4CB8-A206-108293BCFFE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E5187F6-E3AC-4E0D-B1D0-83DE76C20A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"272268EE-E3E8-4683-B679-55D748877A7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B69FD33-61FE-4F10-BBE1-215F59035D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D7CB5D-82EF-4A24-A792-938FAB40863D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A044B21-47D5-468D-AF4A-06B3B5CC0824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2196F3D0-532A-40F9-843A-1DFBC8B63FDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBEDA932-6CB5-438C-94E4-824732A91BE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"903E5524-5E45-48CE-A804-EDAEBE3A79AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"08534AF2-F94E-4FB6-A572-4FB9827276D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"29E3B4A6-1346-4358-B7BC-84D00ED3ABBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B52D7A6B-DD93-45F0-9186-18ABEFF28DF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F07C641-48DF-43BE-9EB5-72B337C54846\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1CB1B12-99F5-430F-AE19-9A95C17FA123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A7C449-8F9A-4CE5-9C3D-375996BFAEE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05D5D58C-DB79-41EA-81AE-5D95C48211B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE331D6D-99BA-4369-AD8B-B556DEE4955F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58304E17-ADFD-4686-9CCF-C1CA31843B94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"05108EF0-81AD-4378-9843-5C23F2AC79A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EE7DA7E-23A5-42AF-9D5C-39240CE2FBDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C448F62-8231-4221-ADA0-C9B848AE03D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FBD11A1-51C7-4AF7-AA0B-3A14C5435E70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60255706-C44A-48CB-B98B-A1F0991CBC74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0456E2E8-EF06-414E-8A7D-8005F0EB46B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9EE4763-2495-4B6A-B72F-344967E51C27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"224BD488-0D7E-4F8B-9012-DE872DEB544C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB51F3E9-4899-49A9-9E7B-0DCA92A91DD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F884F2F4-94F3-46CB-860B-1BCC0EEF408A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"88DFBB48-1C29-4639-9369-F5B413CA2337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D37696D7-BEE6-4587-9E33-A7FE24780409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95B5D44-0C8D-47BC-A89D-48A5BDEB84F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DFDAF6A-76AA-436F-A4F3-DA69892DE2B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3172982-3FA4-427F-BE3E-2321D804E49D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6EC85B-F092-48FF-966A-96B9227C8656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"9000F3C1-57A0-474C-9C82-E58688F29838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E55E42E-AB6A-4E47-AC69-DFDAEB0A8735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A42F4E7A-6F6A-485C-8D30-95F3B0285922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B9C0CB-F6E6-4233-84E4-D6E69104DD73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"84309CC7-A8B7-4ADB-AEA1-964DA5F7B0E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5343241F-274D-45FF-97C7-2BC2E920BAF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED122B8-AF4C-4C48-B1E5-54F4A7A31A53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"157ACCAD-0FB8-4CC9-9DFB-70835DE6506C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E50ACF6-7277-4C9A-B42A-E7EFDC317691\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C191DC2B-1EC3-48E0-A586-867E6EE4431C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AA51263-6680-42C6-B119-8241D6F76206\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4BC41E8-FEDA-4C31-B479-D49A59FC4D63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C20971-53B5-43B0-AC45-5AA0FDF1B054\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1AEFA5D-A793-4BAB-8DED-3D3A31260AD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"496902D6-409A-40D9-849F-C41264BE5B04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2482AB3F-8303-4F95-BE04-C5F06EEF2015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"244C6952-377C-4AF0-8BA2-C34516A3EB5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98A79CC5-71EC-4E90-9E99-2DF62ABC0122\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6562F3C3-D794-4107-95D4-1C0B0486940B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F0635C-4EBF-4EA3-9756-A85A3BB5026B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0698.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1863.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT5784\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0698.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1863.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5784\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2013-1855
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2013-1855", "description": "The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.", "id": "GSD-2013-1855", "references": [ "https://www.suse.com/security/cve/CVE-2013-1855.html", "https://www.debian.org/security/2013/dsa-2655", "https://access.redhat.com/errata/RHSA-2014:1863", "https://access.redhat.com/errata/RHSA-2013:0698" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "affected": [ { "package": { "ecosystem": "RubyGems", "name": "actionpack", "purl": "pkg:gem/actionpack" } } ], "aliases": [ "CVE-2013-1855", "OSVDB-91452" ], "details": "The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences. A cross-site scripting (XSS) flaw was found in Action Pack. A remote attacker could use this flaw to conduct XSS attacks against users of an application using Action Pack.", "id": "GSD-2013-1855", "modified": "2013-03-19T00:00:00.000Z", "published": "2013-03-19T00:00:00.000Z", "references": [ { "type": "WEB", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1855" } ], "schema_version": "1.4.0", "severity": [ { "score": 4.3, "type": "CVSS_V2" } ], "summary": "CVE-2013-1855 rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1855", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "name": "http://support.apple.com/kb/HT5784", "refsource": "MISC", "url": "http://support.apple.com/kb/HT5784" }, { "name": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html" }, { "name": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/", "refsource": "MISC", "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/" }, { "name": "http://rhn.redhat.com/errata/RHSA-2014-1863.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2013-0698.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html" }, { "name": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain", "refsource": "MISC", "url": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain" } ] } }, "github.com/rubysec/ruby-advisory-db": { "cve": "2013-1855", "cvss_v2": 4.3, "date": "2013-03-19", "description": "The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences. A cross-site scripting (XSS) flaw was found in Action Pack. A remote attacker could use this flaw to conduct XSS attacks against users of an application using Action Pack.", "framework": "rails", "gem": "actionpack", "osvdb": 91452, "patched_versions": [ "~\u003e 2.3.18", "~\u003e 3.1.12", "\u003e= 3.2.13" ], "title": "CVE-2013-1855 rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1855" }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c2.3.18 || \u003e=2.4.0 \u003c3.1.12 || \u003e=3.2.0 \u003c3.2.13", "affected_versions": "All versions before 2.3.18, all versions starting from 2.4.0 before 3.1.12, all versions starting from 3.2.0 before 3.2.13", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "cwe_ids": [ "CWE-1035", "CWE-79", "CWE-937" ], "date": "2019-08-08", "description": "Carefully crafted text can bypass the sanitization provided in the `sanitize_css` method in Action Pack.", "fixed_versions": [ "2.3.18", "3.1.12", "3.2.13" ], "identifier": "CVE-2013-1855", "identifiers": [ "CVE-2013-1855" ], "not_impacted": "None", "package_slug": "gem/actionpack", "pubdate": "2013-03-19", "solution": "Upgrade, patches and workarounds available (see source)", "title": "XSS vulnerability in sanitize_css in Action Pack", "urls": [ "https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/4_QHo4BqnN8" ], "uuid": "2ee780ef-3b6b-46bc-a20e-4bf5bc73b75b" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.3.17", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rubyonrails:ruby_on_rails:3.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1855" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "[rubyonrails-security] 20130318 [CVE-2013-1855] XSS vulnerability in sanitize_css in Action Pack", "refsource": "MLIST", "tags": [], "url": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain" }, { "name": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/", "refsource": "CONFIRM", "tags": [], "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/" }, { "name": "RHSA-2013:0698", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html" }, { "name": "openSUSE-SU-2013:0661", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html" }, { "name": "openSUSE-SU-2013:0662", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html" }, { "name": "APPLE-SA-2013-06-04-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "name": "http://support.apple.com/kb/HT5784", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT5784" }, { "name": "APPLE-SA-2013-10-22-5", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html" }, { "name": "openSUSE-SU-2014:0019", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html" }, { "name": "RHSA-2014:1863", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T00:28Z", "publishedDate": "2013-03-19T22:55Z" } } }
ghsa-q759-hwvc-m3jg
Vulnerability from github
The sanitize_css
method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb
in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n
(newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
{ "affected": [ { "package": { "ecosystem": "RubyGems", "name": "actionpack" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.3.18" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "RubyGems", "name": "actionpack" }, "ranges": [ { "events": [ { "introduced": "3.0.0" }, { "fixed": "3.1.12" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "RubyGems", "name": "actionpack" }, "ranges": [ { "events": [ { "introduced": "3.2.0" }, { "fixed": "3.2.13" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2013-1855" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:51:17Z", "nvd_published_at": "2013-03-19T22:55:00Z", "severity": "MODERATE" }, "details": "The `sanitize_css` method in `lib/action_controller/vendor/html-scanner/html/sanitizer.rb` in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle `\\n` (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.", "id": "GHSA-q759-hwvc-m3jg", "modified": "2023-08-25T20:06:33Z", "published": "2017-10-24T18:33:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1855" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2013:0698" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2014:1863" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2013-1855" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921331" }, { "type": "WEB", "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-1855.yml" }, { "type": "WEB", "url": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain" }, { "type": "WEB", "url": "https://web.archive.org/web/20130609174600/http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "type": "WEB", "url": "https://web.archive.org/web/20131109010518/http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1863.html" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5784" }, { "type": "WEB", "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released" } ], "schema_version": "1.4.0", "severity": [], "summary": "actionpack Cross-site Scripting vulnerability" }
rhsa-2013_0698
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated rubygem-actionpack and ruby193-rubygem-actionpack packages that\nfix two security issues are now available for Red Hat OpenShift Enterprise\n1.1.3.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Ruby on Rails is a model\u2013view\u2013controller (MVC) framework for web\napplication development. Action Pack implements the controller and the view\ncomponents.\n\nTwo cross-site scripting (XSS) flaws were found in rubygem-actionpack and\nruby193-rubygem-actionpack. A remote attacker could use these flaws to\nconduct XSS attacks against users of an application using\nrubygem-actionpack or ruby193-rubygem-actionpack. (CVE-2013-1855,\nCVE-2013-1857)\n\nRed Hat would like to thank Ruby on Rails upstream for reporting these\nissues. Upstream acknowledges Charlie Somerville as the original reporter\nof CVE-2013-1855, and Alan Jenkins as the original reporter of\nCVE-2013-1857.\n\nUsers of Red Hat OpenShift Enterprise 1.1.3 are advised to upgrade to these\nupdated packages, which correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0698", "url": "https://access.redhat.com/errata/RHSA-2013:0698" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "921331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921331" }, { "category": "external", "summary": "921335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921335" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0698.json" } ], "title": "Red Hat Security Advisory: rubygem-actionpack and ruby193-rubygem-actionpack security update", "tracking": { "current_release_date": "2024-11-22T06:25:02+00:00", "generator": { "date": "2024-11-22T06:25:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:0698", "initial_release_date": "2013-04-02T19:42:00+00:00", "revision_history": [ { "date": "2013-04-02T19:42:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-04-02T19:45:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:25:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Enterprise Infrastructure", "product": { "name": "Red Hat OpenShift Enterprise Infrastructure", "product_id": "6Server-RHOSE-INFRA", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:1::el6" } } }, { "category": "product_name", "name": "Red Hat OpenShift Enterprise Node", "product": { "name": "Red Hat OpenShift Enterprise Node", "product_id": "6Server-RHOSE-NODE", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:1::el6" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "product": { "name": "ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "product_id": "ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-actionpack-doc@3.2.8-5.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "product": { "name": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "product_id": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-actionpack@3.2.8-5.el6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "rubygem-actionpack-1:3.0.13-8.el6op.noarch", "product": { "name": "rubygem-actionpack-1:3.0.13-8.el6op.noarch", "product_id": "rubygem-actionpack-1:3.0.13-8.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-actionpack@3.0.13-8.el6op?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "product": { "name": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "product_id": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-actionpack@3.2.8-5.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rubygem-actionpack-1:3.0.13-8.el6op.src", "product": { "name": "rubygem-actionpack-1:3.0.13-8.el6op.src", "product_id": "rubygem-actionpack-1:3.0.13-8.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-actionpack@3.0.13-8.el6op?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch as a component of Red Hat OpenShift Enterprise Infrastructure", "product_id": "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch" }, "product_reference": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "relates_to_product_reference": "6Server-RHOSE-INFRA" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.src as a component of Red Hat OpenShift Enterprise Infrastructure", "product_id": "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src" }, "product_reference": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "relates_to_product_reference": "6Server-RHOSE-INFRA" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch as a component of Red Hat OpenShift Enterprise Infrastructure", "product_id": "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch" }, "product_reference": "ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "relates_to_product_reference": "6Server-RHOSE-INFRA" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-actionpack-1:3.0.13-8.el6op.noarch as a component of Red Hat OpenShift Enterprise Infrastructure", "product_id": "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.noarch" }, "product_reference": "rubygem-actionpack-1:3.0.13-8.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-INFRA" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-actionpack-1:3.0.13-8.el6op.src as a component of Red Hat OpenShift Enterprise Infrastructure", "product_id": "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.src" }, "product_reference": "rubygem-actionpack-1:3.0.13-8.el6op.src", "relates_to_product_reference": "6Server-RHOSE-INFRA" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch as a component of Red Hat OpenShift Enterprise Node", "product_id": "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch" }, "product_reference": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.src as a component of Red Hat OpenShift Enterprise Node", "product_id": "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src" }, "product_reference": "ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "relates_to_product_reference": "6Server-RHOSE-NODE" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch as a component of Red Hat OpenShift Enterprise Node", "product_id": "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch" }, "product_reference": "ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ruby on Rails upstream" ] }, { "names": [ "Charlie Somerville" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-1855", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-03-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "921331" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in Action Pack. A remote attacker could use this flaw to conduct XSS attacks against users of an application using Action Pack.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1855" }, { "category": "external", "summary": "RHBZ#921331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1855", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1855" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1855", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1855" } ], "release_date": "2013-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-04-02T19:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0698" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css" }, { "acknowledgments": [ { "names": [ "Ruby on Rails upstream" ] }, { "names": [ "Alan Jenkins" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-1857", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-03-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "921335" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in Action Pack. A remote attacker could use this flaw to conduct XSS attacks against users of an application using Action Pack.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-actionpack: sanitize_protocol: XSS Vulnerability in the helper of Ruby on Rails", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1857" }, { "category": "external", "summary": "RHBZ#921335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921335" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1857", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1857" } ], "release_date": "2013-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-04-02T19:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0698" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-INFRA:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.noarch", "6Server-RHOSE-INFRA:rubygem-actionpack-1:3.0.13-8.el6op.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.noarch", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-1:3.2.8-5.el6.src", "6Server-RHOSE-NODE:ruby193-rubygem-actionpack-doc-1:3.2.8-5.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-actionpack: sanitize_protocol: XSS Vulnerability in the helper of Ruby on Rails" } ] }
rhsa-2014_1863
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Subscription Asset Manager 1.4 packages that fix multiple security\nissues are now available.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Subscription Asset Manager acts as a proxy for handling\nsubscription information and software updates on client machines. Red Hat\nSubscription Asset Manager is built on Ruby on Rails, a\nmodel-view-controller (MVC) framework for web application development.\nAction Pack implements the controller and the view components.\n\nA directory traversal flaw was found in the way Ruby on Rails handled\nwildcard segments in routes with implicit rendering. A remote attacker\ncould use this flaw to retrieve arbitrary local files accessible to a Ruby\non Rails application using the aforementioned routes via a specially\ncrafted request. (CVE-2014-0130)\n\nA flaw was found in the way Ruby on Rails handled hashes in certain\nqueries. A remote attacker could use this flaw to perform a denial of\nservice (resource consumption) attack by sending specially crafted queries\nthat would result in the creation of Ruby symbols, which were never garbage\ncollected. (CVE-2013-1854)\n\nTwo cross-site scripting (XSS) flaws were found in Action Pack. A remote\nattacker could use these flaws to conduct XSS attacks against users of an\napplication using Action Pack. (CVE-2013-1855, CVE-2013-1857)\n\nIt was discovered that the internationalization component of Ruby on Rails\ncould, under certain circumstances, return a fallback HTML string that\ncontained user input. A remote attacker could possibly use this flaw to\nperform a reflective cross-site scripting (XSS) attack by providing a\nspecially crafted input to an application using the aforementioned\ncomponent. (CVE-2013-4491)\n\nA denial of service flaw was found in the header handling component of\nAction View. A remote attacker could send strings in specially crafted\nheaders that would be cached indefinitely, which would result in all\navailable system memory eventually being consumed. (CVE-2013-6414)\n\nIt was found that the number_to_currency Action View helper did not\nproperly escape the unit parameter. An attacker could use this flaw to\nperform a cross-site scripting (XSS) attack on an application that uses\ndata submitted by a user in the unit parameter. (CVE-2013-6415)\n\nRed Hat would like to thank Ruby on Rails upstream for reporting these\nissues. Upstream acknowledges Ben Murphy as the original reporter of\nCVE-2013-1854, Charlie Somerville as the original reporter of\nCVE-2013-1855, Alan Jenkins as the original reporter of CVE-2013-1857,\nPeter McLarnan as the original reporter of CVE-2013-4491, Toby Hsieh as the\noriginal reporter of CVE-2013-6414, and Ankit Gupta as the original\nreporter of CVE-2013-6415.\n\nAll Subscription Asset Manager users are advised to upgrade to these\nupdated packages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1863", "url": "https://access.redhat.com/errata/RHSA-2014:1863" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "921329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921329" }, { "category": "external", "summary": "921331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921331" }, { "category": "external", "summary": "921335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921335" }, { "category": "external", "summary": "1036483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036483" }, { "category": "external", "summary": "1036910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036910" }, { "category": "external", "summary": "1036922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036922" }, { "category": "external", "summary": "1095105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1095105" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1863.json" } ], "title": "Red Hat Security Advisory: Subscription Asset Manager 1.4 security update", "tracking": { "current_release_date": "2024-11-22T06:25:19+00:00", "generator": { "date": "2024-11-22T06:25:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1863", "initial_release_date": "2014-11-17T17:08:19+00:00", "revision_history": [ { "date": "2014-11-17T17:08:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-11-17T17:08:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:25:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Subscription Asset Manager for RHEL 6 Server", "product": { "name": "Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14", "product_identification_helper": { "cpe": "cpe:/a:rhel_sam:1.4::el6" } } } ], "category": "product_family", "name": "Red Hat Subscription Asset Manager" }, { "branches": [ { "category": "product_version", "name": "ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "product": { "name": "ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "product_id": "ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-activemodel@3.2.17-1.el6sam?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "product": { "name": "ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "product_id": "ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-activeresource@3.2.17-1.el6sam?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "product": { "name": "ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "product_id": "ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-actionmailer@3.2.17-1.el6sam?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "product": { "name": "ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "product_id": "ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-actionpack@3.2.17-6.el6sam?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "product": { "name": "ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "product_id": "ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-rails@3.2.17-1.el6sam?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "product": { "name": "ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "product_id": "ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-rack@1.4.5-3.el6sam?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "product": { "name": "ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "product_id": "ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-mail@2.5.4-1.el6sam?arch=src" } } }, { "category": "product_version", "name": "ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "product": { "name": "ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "product_id": "ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-i18n@0.6.9-1.el6sam?arch=src" } } }, { "category": "product_version", "name": "ruby193-rubygem-railties-1:3.2.17-1.el6sam.src", "product": { "name": "ruby193-rubygem-railties-1:3.2.17-1.el6sam.src", "product_id": "ruby193-rubygem-railties-1:3.2.17-1.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-railties@3.2.17-1.el6sam?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "product": { "name": "ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "product_id": "ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-activesupport@3.2.17-2.el6sam?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "product": { "name": "ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "product_id": "ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-activerecord@3.2.17-5.el6sam?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "katello-0:1.4.3.28-1.el6sam_splice.src", "product": { "name": "katello-0:1.4.3.28-1.el6sam_splice.src", "product_id": "katello-0:1.4.3.28-1.el6sam_splice.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello@1.4.3.28-1.el6sam_splice?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "product": { "name": "ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "product_id": "ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-activemodel@3.2.17-1.el6sam?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "product": { "name": "ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "product_id": "ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-activeresource@3.2.17-1.el6sam?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "product": { "name": "ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "product_id": "ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-actionmailer@3.2.17-1.el6sam?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "product": { "name": "ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "product_id": "ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-actionpack@3.2.17-6.el6sam?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "product": { "name": "ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "product_id": "ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-rails@3.2.17-1.el6sam?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "product": { "name": "ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "product_id": "ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-rack@1.4.5-3.el6sam?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "product": { "name": "ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "product_id": "ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-mail@2.5.4-1.el6sam?arch=noarch" } } }, { "category": "product_version", "name": "ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "product": { "name": "ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "product_id": "ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-i18n@0.6.9-1.el6sam?arch=noarch" } } }, { "category": "product_version", "name": "ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "product": { "name": "ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "product_id": "ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-railties@3.2.17-1.el6sam?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "product": { "name": "ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "product_id": "ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-activesupport@3.2.17-2.el6sam?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "product": { "name": "ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "product_id": "ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby193-rubygem-activerecord@3.2.17-5.el6sam?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "product": { "name": "katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "product_id": "katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-headpin-all@1.4.3.28-1.el6sam_splice?arch=noarch" } } }, { "category": "product_version", "name": "katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "product": { "name": "katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "product_id": "katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-common@1.4.3.28-1.el6sam_splice?arch=noarch" } } }, { "category": "product_version", "name": "katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "product": { "name": "katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "product_id": "katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-headpin@1.4.3.28-1.el6sam_splice?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "product": { "name": "katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "product_id": "katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-candlepin@1.4.3.28-1.el6sam_splice?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "product": { "name": "katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "product_id": "katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-elasticsearch@1.4.3.28-1.el6sam_splice?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "katello-0:1.4.3.28-1.el6sam_splice.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src" }, "product_reference": "katello-0:1.4.3.28-1.el6sam_splice.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "katello-common-0:1.4.3.28-1.el6sam_splice.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch" }, "product_reference": "katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch" }, "product_reference": "katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch" }, "product_reference": "katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch" }, "product_reference": "katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch" }, "product_reference": "katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch" }, "product_reference": "ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src" }, "product_reference": "ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch" }, "product_reference": "ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src" }, "product_reference": "ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch" }, "product_reference": "ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src" }, "product_reference": "ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch" }, "product_reference": "ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src" }, "product_reference": "ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch" }, "product_reference": "ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src" }, "product_reference": "ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch" }, "product_reference": "ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src" }, "product_reference": "ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch" }, "product_reference": "ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src" }, "product_reference": "ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch" }, "product_reference": "ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-mail-0:2.5.4-1.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src" }, "product_reference": "ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch" }, "product_reference": "ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-rack-1:1.4.5-3.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src" }, "product_reference": "ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch" }, "product_reference": "ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-rails-1:3.2.17-1.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src" }, "product_reference": "ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch" }, "product_reference": "ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" }, { "category": "default_component_of", "full_product_name": { "name": "ruby193-rubygem-railties-1:3.2.17-1.el6sam.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" }, "product_reference": "ruby193-rubygem-railties-1:3.2.17-1.el6sam.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager14" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ruby on Rails upstream" ] }, { "names": [ "Ben Murphy" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-1854", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2013-03-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "921329" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Ruby on Rails handled hashes in certain queries. A remote attacker could use this flaw to perform a denial of service (resource consumption) attack by sending specially crafted queries that would result in the creation of Ruby symbols, which were never garbage collected.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-activerecord: attribute_dos Symbol DoS vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1854" }, { "category": "external", "summary": "RHBZ#921329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1854", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1854" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1854", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1854" } ], "release_date": "2013-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T17:08:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1863" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-activerecord: attribute_dos Symbol DoS vulnerability" }, { "acknowledgments": [ { "names": [ "Ruby on Rails upstream" ] }, { "names": [ "Charlie Somerville" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-1855", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-03-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "921331" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in Action Pack. A remote attacker could use this flaw to conduct XSS attacks against users of an application using Action Pack.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1855" }, { "category": "external", "summary": "RHBZ#921331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1855", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1855" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1855", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1855" } ], "release_date": "2013-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T17:08:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1863" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css" }, { "acknowledgments": [ { "names": [ "Ruby on Rails upstream" ] }, { "names": [ "Alan Jenkins" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-1857", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-03-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "921335" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in Action Pack. A remote attacker could use this flaw to conduct XSS attacks against users of an application using Action Pack.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-actionpack: sanitize_protocol: XSS Vulnerability in the helper of Ruby on Rails", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1857" }, { "category": "external", "summary": "RHBZ#921335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921335" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1857", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1857" } ], "release_date": "2013-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T17:08:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1863" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-actionpack: sanitize_protocol: XSS Vulnerability in the helper of Ruby on Rails" }, { "acknowledgments": [ { "names": [ "Ruby on Rails upstream" ] }, { "names": [ "Peter McLarnan" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-4491", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1036922" } ], "notes": [ { "category": "description", "text": "It was discovered that the internationalization component of Ruby on Rails could, under certain circumstances, return a fallback HTML string that contained user input. A remote attacker could possibly use this flaw to perform a reflective cross-site scripting (XSS) attack by providing a specially crafted input to an application using the aforementioned component.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-actionpack: i18n missing translation XSS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4491" }, { "category": "external", "summary": "RHBZ#1036922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036922" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4491" } ], "release_date": "2013-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T17:08:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1863" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-actionpack: i18n missing translation XSS" }, { "acknowledgments": [ { "names": [ "Ruby on Rails upstream" ] }, { "names": [ "Toby Hsieh" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6414", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2013-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1036483" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the header handling component of Action View. A remote attacker could send strings in specially crafted headers that would be cached indefinitely, which would result in all available system memory eventually being consumed.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-actionpack: Action View DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6414" }, { "category": "external", "summary": "RHBZ#1036483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6414", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6414" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6414", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6414" } ], "release_date": "2013-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T17:08:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1863" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-actionpack: Action View DoS" }, { "acknowledgments": [ { "names": [ "Ruby on Rails upstream" ] }, { "names": [ "Ankit Gupta" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-6415", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1036910" } ], "notes": [ { "category": "description", "text": "It was found that the number_to_currency Action View helper did not properly escape the unit parameter. An attacker could use this flaw to perform a cross-site scripting (XSS) attack on an application that uses data submitted by a user in the unit parameter.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-actionpack: number_to_currency XSS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6415" }, { "category": "external", "summary": "RHBZ#1036910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6415", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6415" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6415", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6415" } ], "release_date": "2013-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T17:08:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1863" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-actionpack: number_to_currency XSS" }, { "cve": "CVE-2014-0130", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2014-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1095105" } ], "notes": [ { "category": "description", "text": "A directory traversal flaw was found in the way Ruby on Rails handled wildcard segments in routes with implicit rendering. A remote attacker could use this flaw to retrieve arbitrary local files accessible to a Ruby on Rails application using the aforementioned routes via a specially crafted request.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-actionpack: directory traversal issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0130" }, { "category": "external", "summary": "RHBZ#1095105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1095105" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0130", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0130" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0130", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0130" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2014-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-17T17:08:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1863" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager14:katello-0:1.4.3.28-1.el6sam_splice.src", "6Server-SubscriptionAssetManager14:katello-common-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-candlepin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-glue-elasticsearch-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:katello-headpin-all-0:1.4.3.28-1.el6sam_splice.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionmailer-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-actionpack-1:3.2.17-6.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activemodel-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activerecord-1:3.2.17-5.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activeresource-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-activesupport-1:3.2.17-2.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-i18n-0:0.6.9-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-mail-0:2.5.4-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rack-1:1.4.5-3.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-rails-1:3.2.17-1.el6sam.src", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.noarch", "6Server-SubscriptionAssetManager14:ruby193-rubygem-railties-1:3.2.17-1.el6sam.src" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "rubygem-actionpack: directory traversal issue" } ] }
var-201303-0424
Vulnerability from variot
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences. Ruby on Rails is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The vulnerability is fixed in the following versions: Ruby on Rails 2.3.18, 3.1.12, and 3.2.13.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-ruby/rails < 2.3.18 >= 2.3.18 * ------------------------------------------------------------------- NOTE: Packages marked with asterisks require manual intervention!
Description
Multiple vulnerabilities have been discovered in Ruby on Rails. Please review the CVE identifiers referenced below for details. Furthermore, a remote attacker may be able to execute arbitrary SQL commands, change parameter names for form inputs and make changes to arbitrary records in the system, bypass intended access restrictions, render arbitrary views, inject arbitrary web script or HTML, or conduct cross-site request forgery (CSRF) attacks.
Workaround
There is no known workaround at this time.
Resolution
All Ruby on Rails 2.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-ruby/rails-2.3.18"
NOTE: All applications using Ruby on Rails should also be configured to use the latest version available by running "rake rails:update" inside the application directory.
NOTE: This is a legacy GLSA and stable updates for Ruby on Rails, including the unaffected version listed above, are no longer available from Gentoo. It may be possible to upgrade to the 3.2, 4.0, or 4.1 branches, however these packages are not currently stable.
References
[ 1 ] CVE-2010-3933 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3933 [ 2 ] CVE-2011-0446 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0446 [ 3 ] CVE-2011-0447 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0447 [ 4 ] CVE-2011-0448 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0448 [ 5 ] CVE-2011-0449 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0449 [ 6 ] CVE-2011-2929 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2929 [ 7 ] CVE-2011-2930 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2930 [ 8 ] CVE-2011-2931 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2931 [ 9 ] CVE-2011-2932 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2932 [ 10 ] CVE-2011-3186 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3186 [ 11 ] CVE-2013-0155 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0155 [ 12 ] CVE-2013-0156 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0156 [ 13 ] CVE-2013-0276 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0276 [ 14 ] CVE-2013-0277 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0277 [ 15 ] CVE-2013-0333 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0333 [ 16 ] CVE-2013-1854 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1854 [ 17 ] CVE-2013-1855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1855 [ 18 ] CVE-2013-1856 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1856 [ 19 ] CVE-2013-1857 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1857
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201412-28.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
For the stable distribution (squeeze), these problems have been fixed in version 2.3.5-1.2+squeeze8.
For the testing distribution (wheezy) and the unstable distribution (sid), these problems have been fixed in the version 3.2.6-5 of ruby-activerecord-3.2, version 2.3.14-6 of ruby-activerecord-2.3, version 2.3.14-7 of ruby-activesupport-2.3, version 3.2.6-6 of ruby-actionpack-3.2 and in version 2.3.14-5 of ruby-actionpack-2.3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2013-06-04-1 OS X Mountain Lion v10.8.4 and Security Update 2013-002
OS X Mountain Lion v10.8.4 and Security Update 2013-002 is now available and addresses the following:
CFNetwork Available for: OS X Mountain Lion v10.8 to v10.8.3 Impact: An attacker with access to a user's session may be able to log into previously accessed sites, even if Private Browsing was used Description: Permanent cookies were saved after quitting Safari, even when Private Browsing was enabled. This issue was addressed by improved handling of cookies. CVE-ID CVE-2013-0982 : Alexander Traud of www.traud.de
CoreAnimation Available for: OS X Mountain Lion v10.8 to v10.8.3 Impact: Visiting a maliciously crafted site may lead to an unexpected application termination or arbitrary code execution Description: An unbounded stack allocation issue existed in the handling of text glyphs. This could be triggered by maliciously crafted URLs in Safari. The issue was addressed through improved bounds checking. CVE-ID CVE-2013-0983 : David Fifield of Stanford University, Ben Syverson
CoreMedia Playback Available for: OS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5, OS X Mountain Lion v10.8 to v10.8.3 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access issue existed in the handling of text tracks. This issue was addressed by additional validation of text tracks. CVE-ID CVE-2013-1024 : Richard Kuo and Billy Suguitan of Triemt Corporation
CUPS Available for: OS X Mountain Lion v10.8 to v10.8.3 Impact: A local user in the lpadmin group may be able to read or write arbitrary files with system privileges Description: A privilege escalation issue existed in the handling of CUPS configuration via the CUPS web interface. A local user in the lpadmin group may be able to read or write arbitrary files with system privileges. This issue was addressed by moving certain configuration directives to cups-files.conf, which can not be modified from the CUPS web interface. CVE-ID CVE-2012-5519
Directory Service Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8 Impact: A remote attacker may execute arbitrary code with system privileges on systems with Directory Service enabled Description: An issue existed in the directory server's handling of messages from the network. This issue was addressed through improved bounds checking. This issue does not affect OS X Lion or OS X Mountain Lion systems. CVE-ID CVE-2013-0984 : Nicolas Economou of Core Security
Disk Management Available for: OS X Mountain Lion v10.8 to v10.8.3 Impact: A local user may disable FileVault Description: A local user who is not an administrator may disable FileVault using the command-line. This issue was addressed by adding additional authentication. CVE-ID CVE-2013-0985
OpenSSL Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5, OS X Mountain Lion v10.8 to v10.8.3 Impact: An attacker may be able to decrypt data protected by SSL Description: There were known attacks on the confidentiality of TLS 1.0 when compression was enabled. This issue was addressed by disabling compression in OpenSSL. CVE-ID CVE-2012-4929 : Juliano Rizzo and Thai Duong
OpenSSL Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5, OS X Mountain Lion v10.8 to v10.8.3 Impact: Multiple vulnerabilities in OpenSSL Description: OpenSSL was updated to version 0.9.8x to address multiple vulnerabilities, which may lead to denial of service or disclosure of a private key. Further information is available via the OpenSSL website at http://www.openssl.org/news/ CVE-ID CVE-2011-1945 CVE-2011-3207 CVE-2011-3210 CVE-2011-4108 CVE-2011-4109 CVE-2011-4576 CVE-2011-4577 CVE-2011-4619 CVE-2012-0050 CVE-2012-2110 CVE-2012-2131 CVE-2012-2333
QuickDraw Manager Available for: OS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5, OS X Mountain Lion v10.8 to v10.8.2 Impact: Opening a maliciously crafted PICT image may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of PICT images. This issue was addressed through improved bounds checking. CVE-ID CVE-2013-0975 : Tobias Klein working with HP's Zero Day Initiative
QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5, OS X Mountain Lion v10.8 to v10.8.3 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of 'enof' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2013-0986 : Tom Gallagher (Microsoft) & Paul Bates (Microsoft) working with HP's Zero Day Initiative
QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5, OS X Mountain Lion v10.8 to v10.8.3 Impact: Viewing a maliciously crafted QTIF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of QTIF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2013-0987 : roob working with iDefense VCP
QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5, OS X Mountain Lion v10.8 to v10.8.3 Impact: Viewing a maliciously crafted FPX file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of FPX files. This issue was addressed through improved bounds checking. CVE-ID CVE-2013-0988 : G. Geshev working with HP's Zero Day Initiative
QuickTime Available for: OS X Mountain Lion v10.8 to v10.8.3 Impact: Playing a maliciously crafted MP3 file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of MP3 files. This issue was addressed through improved bounds checking. CVE-ID CVE-2013-0989 : G. Geshev working with HP's Zero Day Initiative
Ruby Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8 Impact: Multiple vulnerabilities in Ruby on Rails Description: Multiple vulnerabilities existed in Ruby on Rails, the most serious of which may lead to arbitrary code execution on systems running Ruby on Rails applications. This issue may affect OS X Lion or OS X Mountain Lion systems that were upgraded from Mac OS X 10.6.8 or earlier. Users can update affected gems on such systems by using the /usr/bin/gem utility. CVE-ID CVE-2013-0155 CVE-2013-0276 CVE-2013-0277 CVE-2013-0333 CVE-2013-1854 CVE-2013-1855 CVE-2013-1856 CVE-2013-1857
SMB Available for: OS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5, OS X Mountain Lion v10.8 to v10.8.3 Impact: An authenticated user may be able to write files outside the shared directory Description: If SMB file sharing is enabled, an authenticated user may be able to write files outside the shared directory. This issue was addressed through improved access control. CVE-ID CVE-2013-0990 : Ward van Wanrooij
Note: Starting with OS X 10.8.4, Java Web Start (i.e. JNLP) applications downloaded from the Internet need to be signed with a Developer ID certificate. Gatekeeper will check downloaded Java Web Start applications for a signature and block such applications from launching if they are not properly signed.
Note: OS X Mountain Lion v10.8.4 includes the content of Safari 6.0.5. For further details see "About the security content of Safari 6.0.5" at http://http//support.apple.com/kb/HT5785
OS X Mountain Lion v10.8.4 and Security Update 2013-002 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
The Software Update utility will present the update that applies to your system configuration. Only one is needed, either OS X Mountain Lion v10.8.4, or Security Update 2013-002.
For OS X Mountain Lion v10.8.3 The download file is named: OSXUpd10.8.4.dmg Its SHA-1 digest is: 9cf99aa1293cefdac0fb9a24ea133c80f8237b5e
For OS X Mountain Lion v10.8 and v10.8.2 The download file is named: OSXUpdCombo10.8.4.dmg Its SHA-1 digest is: 3c95d0c8d0c7f43339a5f4e137e386dd5fe409c3
For OS X Lion v10.7.5 The download file is named: SecUpd2013-002.dmg Its SHA-1 digest is: cfc3bd0941d7c5838aee9e92ee087d78abff3ce7
For OS X Lion Server v10.7.5 The download file is named: SecUpdSrvr2013-002.dmg Its SHA-1 digest is: 34dff575a145e13404e7a2ee8a390d3e7c56fb5e
For Mac OS X v10.6.8 The download file is named: SecUpd2013-002.dmg Its SHA-1 digest is: 5da54b38ffb8c147925c3018a8f5bf30ad4ac5b1
For Mac OS X Server v10.6.8 The download file is named: SecUpdSrvr2013-002.dmg Its SHA-1 digest is: b20271f019930fe894c2247a6d5e05f00568b583
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org
iQIcBAEBAgAGBQJRrjkiAAoJEPefwLHPlZEwW+AP/0x/cHS3VPY0/a98Xpmdfkdb eo9Ns5FKw6mIkUftrN6qwNAgFXWqQXNIbJ3q8ZnoxcFPakhYyPSp4XowpR79l7kG B2ZrdTx9aIn2bfHZ+h4cE8XnVL8qUDz2RxFopOGbb+wpJxl8/fehDmWokC5wCeF5 N7mnwW2s37QL73BmAMRdi6CYcJCKwhZWGFWmqiNvpFlUP+kcjU/UM1MAzOu0xsiA PD6NrWeUOWfFrcQgx/pspWGvrFyV4FLu+0wQBl9f/DiQNrwVXIr85rHtah+b1NCU pteSxQwb4kRojXdPm4+I3LKoghzGR8xD6+Xl6KdYgReSW89Di4bKM3WpbRLqhRuq 8kv38Gk3/vZDfAnuNQX09dE6EgJ0DVu86SoRQZ1iYRQoLrizVsOvyVQUojZhT47t 6l44L/5cNJd7EcaC8hdmr44cCZdMPDEqoKzn2BavH62WYXbZMPlHBDo/H2ujUUec i7XU7LA1Upw57X4wmIUU4QrlBhNBh39yRKh3katAklayFBjOMEyyL57gURvd6O77 gFOQpUQ6kgqwgQCrtNT6R96igfyu7cVxYW7XchZDHgA3n/YWOAVvXkVeeQ5OUGzC O0UYLMBpPka31yfWP23QaXpV+LW462raI6LnMvRP1245RhokTTThZw6/9xochK2V +VoeoamqaQqZGyOiObbU =vG2v -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: Subscription Asset Manager 1.4 security update Advisory ID: RHSA-2014:1863-01 Product: Red Hat Subscription Asset Manager Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1863.html Issue date: 2014-11-17 CVE Names: CVE-2013-1854 CVE-2013-1855 CVE-2013-1857 CVE-2013-4491 CVE-2013-6414 CVE-2013-6415 CVE-2014-0130 =====================================================================
- Summary:
Updated Subscription Asset Manager 1.4 packages that fix multiple security issues are now available.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Subscription Asset Manager for RHEL 6 Server - noarch
- Description:
Red Hat Subscription Asset Manager acts as a proxy for handling subscription information and software updates on client machines. Red Hat Subscription Asset Manager is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.
A directory traversal flaw was found in the way Ruby on Rails handled wildcard segments in routes with implicit rendering. A remote attacker could use this flaw to retrieve arbitrary local files accessible to a Ruby on Rails application using the aforementioned routes via a specially crafted request. (CVE-2014-0130)
A flaw was found in the way Ruby on Rails handled hashes in certain queries. A remote attacker could use this flaw to perform a denial of service (resource consumption) attack by sending specially crafted queries that would result in the creation of Ruby symbols, which were never garbage collected. (CVE-2013-1854)
Two cross-site scripting (XSS) flaws were found in Action Pack. A remote attacker could use these flaws to conduct XSS attacks against users of an application using Action Pack. (CVE-2013-1855, CVE-2013-1857)
It was discovered that the internationalization component of Ruby on Rails could, under certain circumstances, return a fallback HTML string that contained user input. A remote attacker could possibly use this flaw to perform a reflective cross-site scripting (XSS) attack by providing a specially crafted input to an application using the aforementioned component. (CVE-2013-4491)
A denial of service flaw was found in the header handling component of Action View. A remote attacker could send strings in specially crafted headers that would be cached indefinitely, which would result in all available system memory eventually being consumed. (CVE-2013-6414)
It was found that the number_to_currency Action View helper did not properly escape the unit parameter. An attacker could use this flaw to perform a cross-site scripting (XSS) attack on an application that uses data submitted by a user in the unit parameter. Upstream acknowledges Ben Murphy as the original reporter of CVE-2013-1854, Charlie Somerville as the original reporter of CVE-2013-1855, Alan Jenkins as the original reporter of CVE-2013-1857, Peter McLarnan as the original reporter of CVE-2013-4491, Toby Hsieh as the original reporter of CVE-2013-6414, and Ankit Gupta as the original reporter of CVE-2013-6415.
All Subscription Asset Manager users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
921329 - CVE-2013-1854 rubygem-activerecord: attribute_dos Symbol DoS vulnerability 921331 - CVE-2013-1855 rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css 921335 - CVE-2013-1857 rubygem-actionpack: sanitize_protocol: XSS Vulnerability in the helper of Ruby on Rails 1036483 - CVE-2013-6414 rubygem-actionpack: Action View DoS 1036910 - CVE-2013-6415 rubygem-actionpack: number_to_currency XSS 1036922 - CVE-2013-4491 rubygem-actionpack: i18n missing translation XSS 1095105 - CVE-2014-0130 rubygem-actionpack: directory traversal issue
- Package List:
Red Hat Subscription Asset Manager for RHEL 6 Server:
Source: katello-1.4.3.28-1.el6sam_splice.src.rpm ruby193-rubygem-actionmailer-3.2.17-1.el6sam.src.rpm ruby193-rubygem-actionpack-3.2.17-6.el6sam.src.rpm ruby193-rubygem-activemodel-3.2.17-1.el6sam.src.rpm ruby193-rubygem-activerecord-3.2.17-5.el6sam.src.rpm ruby193-rubygem-activeresource-3.2.17-1.el6sam.src.rpm ruby193-rubygem-activesupport-3.2.17-2.el6sam.src.rpm ruby193-rubygem-i18n-0.6.9-1.el6sam.src.rpm ruby193-rubygem-mail-2.5.4-1.el6sam.src.rpm ruby193-rubygem-rack-1.4.5-3.el6sam.src.rpm ruby193-rubygem-rails-3.2.17-1.el6sam.src.rpm ruby193-rubygem-railties-3.2.17-1.el6sam.src.rpm
noarch: katello-common-1.4.3.28-1.el6sam_splice.noarch.rpm katello-glue-candlepin-1.4.3.28-1.el6sam_splice.noarch.rpm katello-glue-elasticsearch-1.4.3.28-1.el6sam_splice.noarch.rpm katello-headpin-1.4.3.28-1.el6sam_splice.noarch.rpm katello-headpin-all-1.4.3.28-1.el6sam_splice.noarch.rpm ruby193-rubygem-actionmailer-3.2.17-1.el6sam.noarch.rpm ruby193-rubygem-actionpack-3.2.17-6.el6sam.noarch.rpm ruby193-rubygem-activemodel-3.2.17-1.el6sam.noarch.rpm ruby193-rubygem-activerecord-3.2.17-5.el6sam.noarch.rpm ruby193-rubygem-activeresource-3.2.17-1.el6sam.noarch.rpm ruby193-rubygem-activesupport-3.2.17-2.el6sam.noarch.rpm ruby193-rubygem-i18n-0.6.9-1.el6sam.noarch.rpm ruby193-rubygem-mail-2.5.4-1.el6sam.noarch.rpm ruby193-rubygem-rack-1.4.5-3.el6sam.noarch.rpm ruby193-rubygem-rails-3.2.17-1.el6sam.noarch.rpm ruby193-rubygem-railties-3.2.17-1.el6sam.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2013-1854 https://access.redhat.com/security/cve/CVE-2013-1855 https://access.redhat.com/security/cve/CVE-2013-1857 https://access.redhat.com/security/cve/CVE-2013-4491 https://access.redhat.com/security/cve/CVE-2013-6414 https://access.redhat.com/security/cve/CVE-2013-6415 https://access.redhat.com/security/cve/CVE-2014-0130 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFUai7iXlSAg2UNWIIRAmtEAJ9m+ZUXuva81fLz9G1CLKYi5aJoHACfcd3y SoVal0zNgx0pwtSAkS1q5/0= =i5aK -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201303-0424", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ruby on rails", "scope": "eq", "trust": 1.6, "vendor": "rubyonrails", "version": "3.0.4" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.9.4.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.2.5" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.8" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.7" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.1.4" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.13.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.6" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.7" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.4" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.1.6" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.1.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.3" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.2" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.1.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.10" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.12" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.13" }, { "model": "ruby on rails", "scope": "lte", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.17" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.8" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.9.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.11.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.19" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.8.5" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.11" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.3" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.6" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.9" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.5.5" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.16" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.5" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.4" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.11.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.12.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.14.2" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.14" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.2" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.8" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.13" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.1.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.14.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.2.3" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.1.2" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.1.2" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.2.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.12" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.12.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.9.5" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.5.7" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.5.6" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.9.3" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.2.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.17" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.18" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.1.3" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.5.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.2.2" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.9.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.9.4" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.2.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.1.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.0.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.2.2" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.2.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.10.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.5" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.0.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.10.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.13.1" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.6.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.1.5" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.1" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.10" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.0.4" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.4" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.9" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.9.2" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.14.4" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.2" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.9" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.10" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.14.3" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.6" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.9" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.2.6" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.2" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.5" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.6.5" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.3" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.10" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.11" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.16" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.7" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.0.2" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.0" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.8.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.14" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.3" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.11" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "1.2.4" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.20" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.0.11" }, { "model": "ruby on rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "0.7.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.3.15" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "2.0.0" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.2.12" }, { "model": "rails", "scope": "eq", "trust": 1.0, "vendor": "rubyonrails", "version": "3.1.4" }, { "model": "rails", "scope": "lt", "trust": 0.8, "vendor": "ruby on rails", "version": "3.1.x" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.6.8" }, { "model": "macos server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.0" }, { "model": "rails", "scope": "eq", "trust": 0.8, "vendor": "ruby on rails", "version": "3.0.x" }, { "model": "rails", "scope": "eq", "trust": 0.8, "vendor": "ruby on rails", "version": "3.2.13" }, { "model": "rails", "scope": "eq", "trust": 0.8, "vendor": "ruby on rails", "version": "3.1.12" }, { "model": "rails", "scope": "lt", "trust": 0.8, "vendor": "ruby on rails", "version": "3.2.x" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.6.8" }, { "model": "macos server", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "(apple mac os x v10.9 or later )" }, { "model": "ruby on rails", "scope": "eq", "trust": 0.6, "vendor": "rubyonrails", "version": "2.3.0" }, { "model": "ruby on rails", "scope": "eq", "trust": 0.6, "vendor": "rubyonrails", "version": "3.2.7" }, { "model": "ruby on rails", "scope": "eq", "trust": 0.6, "vendor": "rubyonrails", "version": "3.2.0" }, { "model": "ruby on rails", "scope": "eq", "trust": 0.6, "vendor": "rubyonrails", "version": "3.0.7" }, { "model": "ruby on rails", "scope": "eq", "trust": 0.6, "vendor": "rubyonrails", "version": "3.2.11" }, { "model": "ruby on rails", "scope": "eq", "trust": 0.6, "vendor": "rubyonrails", "version": "3.2.12" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.12" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.11" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.10" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.8" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.7" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.6" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.4" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.2" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.11" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.9" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.8" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.7" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.6" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.5" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.4" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.2" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.17" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.16" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.15" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.11" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.10" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.9" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.5" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.4" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.3" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.2" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2" }, { "model": "on rails ruby on rails 3.1.0.rc6", "scope": null, "trust": 0.3, "vendor": "ruby", "version": null }, { "model": "on rails ruby on rails 3.1.0.rc5", "scope": null, "trust": 0.3, "vendor": "ruby", "version": null }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.14" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.13" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "2.3.12" }, { "model": "openshift enterprise", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "1.1.3" }, { "model": "security network protection xgs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "50005.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x2.2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x2.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x2.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x2.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "on rails ruby on rails", "scope": "ne", "trust": 0.3, "vendor": "ruby", "version": "3.2.13" }, { "model": "on rails ruby on rails", "scope": "ne", "trust": 0.3, "vendor": "ruby", "version": "3.1.12" }, { "model": "on rails ruby on rails", "scope": "ne", "trust": 0.3, "vendor": "ruby", "version": "2.3.18" }, { "model": "security network protection xgs", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "50005.1" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x3.0" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.8.4" } ], "sources": [ { "db": "BID", "id": "58552" }, { "db": "JVNDB", "id": "JVNDB-2013-001928" }, { "db": "CNNVD", "id": "CNNVD-201303-354" }, { "db": "NVD", "id": "CVE-2013-1855" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:rubyonrails:ruby_on_rails", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:os_x_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-001928" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Charlie Somerville", "sources": [ { "db": "BID", "id": "58552" }, { "db": "CNNVD", "id": "CNNVD-201303-354" } ], "trust": 0.9 }, "cve": "CVE-2013-1855", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2013-1855", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-1855", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-1855", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201303-354", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-001928" }, { "db": "CNNVD", "id": "CNNVD-201303-354" }, { "db": "NVD", "id": "CVE-2013-1855" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences. Ruby on Rails is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. \nThe vulnerability is fixed in the following versions:\nRuby on Rails 2.3.18, 3.1.12, and 3.2.13. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-ruby/rails \u003c 2.3.18 \u003e= 2.3.18 *\n -------------------------------------------------------------------\n NOTE: Packages marked with asterisks require manual intervention!\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Ruby on Rails. Please\nreview the CVE identifiers referenced below for details. Furthermore, a remote attacker may be able to\nexecute arbitrary SQL commands, change parameter names for form inputs\nand make changes to arbitrary records in the system, bypass intended\naccess restrictions, render arbitrary views, inject arbitrary web\nscript or HTML, or conduct cross-site request forgery (CSRF) attacks. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Ruby on Rails 2.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-ruby/rails-2.3.18\"\n\nNOTE: All applications using Ruby on Rails should also be configured to\nuse the latest version available by running \"rake rails:update\" inside\nthe application directory. \n\nNOTE: This is a legacy GLSA and stable updates for Ruby on Rails,\nincluding the unaffected version listed above, are no longer available\nfrom Gentoo. It may be possible to upgrade to the 3.2, 4.0, or 4.1\nbranches, however these packages are not currently stable. \n\nReferences\n==========\n\n[ 1 ] CVE-2010-3933\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3933\n[ 2 ] CVE-2011-0446\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0446\n[ 3 ] CVE-2011-0447\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0447\n[ 4 ] CVE-2011-0448\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0448\n[ 5 ] CVE-2011-0449\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0449\n[ 6 ] CVE-2011-2929\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2929\n[ 7 ] CVE-2011-2930\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2930\n[ 8 ] CVE-2011-2931\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2931\n[ 9 ] CVE-2011-2932\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2932\n[ 10 ] CVE-2011-3186\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3186\n[ 11 ] CVE-2013-0155\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0155\n[ 12 ] CVE-2013-0156\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0156\n[ 13 ] CVE-2013-0276\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0276\n[ 14 ] CVE-2013-0277\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0277\n[ 15 ] CVE-2013-0333\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0333\n[ 16 ] CVE-2013-1854\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1854\n[ 17 ] CVE-2013-1855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1855\n[ 18 ] CVE-2013-1856\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1856\n[ 19 ] CVE-2013-1857\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1857\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201412-28.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n\nFor the stable distribution (squeeze), these problems have been fixed in\nversion 2.3.5-1.2+squeeze8. \n\nFor the testing distribution (wheezy) and the unstable distribution (sid),\nthese problems have been fixed in the version 3.2.6-5 of \nruby-activerecord-3.2, version 2.3.14-6 of ruby-activerecord-2.3,\nversion 2.3.14-7 of ruby-activesupport-2.3, version 3.2.6-6 of \nruby-actionpack-3.2 and in version 2.3.14-5 of ruby-actionpack-2.3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2013-06-04-1 OS X Mountain Lion v10.8.4 and Security Update\n2013-002\n\nOS X Mountain Lion v10.8.4 and Security Update 2013-002 is now\navailable and addresses the following:\n\nCFNetwork\nAvailable for: OS X Mountain Lion v10.8 to v10.8.3\nImpact: An attacker with access to a user\u0027s session may be able to\nlog into previously accessed sites, even if Private Browsing was used\nDescription: Permanent cookies were saved after quitting Safari,\neven when Private Browsing was enabled. This issue was addressed by\nimproved handling of cookies. \nCVE-ID\nCVE-2013-0982 : Alexander Traud of www.traud.de\n\nCoreAnimation\nAvailable for: OS X Mountain Lion v10.8 to v10.8.3\nImpact: Visiting a maliciously crafted site may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An unbounded stack allocation issue existed in the\nhandling of text glyphs. This could be triggered by maliciously\ncrafted URLs in Safari. The issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2013-0983 : David Fifield of Stanford University, Ben Syverson\n\nCoreMedia Playback\nAvailable for: OS X Lion v10.7 to v10.7.5,\nOS X Lion Server v10.7 to v10.7.5,\nOS X Mountain Lion v10.8 to v10.8.3\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An uninitialized memory access issue existed in the\nhandling of text tracks. This issue was addressed by additional\nvalidation of text tracks. \nCVE-ID\nCVE-2013-1024 : Richard Kuo and Billy Suguitan of Triemt Corporation\n\nCUPS\nAvailable for: OS X Mountain Lion v10.8 to v10.8.3\nImpact: A local user in the lpadmin group may be able to read or\nwrite arbitrary files with system privileges\nDescription: A privilege escalation issue existed in the handling of\nCUPS configuration via the CUPS web interface. A local user in the\nlpadmin group may be able to read or write arbitrary files with\nsystem privileges. This issue was addressed by moving certain\nconfiguration directives to cups-files.conf, which can not be\nmodified from the CUPS web interface. \nCVE-ID\nCVE-2012-5519\n\nDirectory Service\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8\nImpact: A remote attacker may execute arbitrary code with system\nprivileges on systems with Directory Service enabled\nDescription: An issue existed in the directory server\u0027s handling of\nmessages from the network. This issue was\naddressed through improved bounds checking. This issue does not\naffect OS X Lion or OS X Mountain Lion systems. \nCVE-ID\nCVE-2013-0984 : Nicolas Economou of Core Security\n\nDisk Management\nAvailable for: OS X Mountain Lion v10.8 to v10.8.3\nImpact: A local user may disable FileVault\nDescription: A local user who is not an administrator may disable\nFileVault using the command-line. This issue was addressed by adding\nadditional authentication. \nCVE-ID\nCVE-2013-0985\n\nOpenSSL\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5,\nOS X Mountain Lion v10.8 to v10.8.3\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There were known attacks on the confidentiality of TLS\n1.0 when compression was enabled. This issue was addressed by\ndisabling compression in OpenSSL. \nCVE-ID\nCVE-2012-4929 : Juliano Rizzo and Thai Duong\n\nOpenSSL\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5,\nOS X Mountain Lion v10.8 to v10.8.3\nImpact: Multiple vulnerabilities in OpenSSL\nDescription: OpenSSL was updated to version 0.9.8x to address\nmultiple vulnerabilities, which may lead to denial of service or\ndisclosure of a private key. Further information is available via the\nOpenSSL website at http://www.openssl.org/news/\nCVE-ID\nCVE-2011-1945\nCVE-2011-3207\nCVE-2011-3210\nCVE-2011-4108\nCVE-2011-4109\nCVE-2011-4576\nCVE-2011-4577\nCVE-2011-4619\nCVE-2012-0050\nCVE-2012-2110\nCVE-2012-2131\nCVE-2012-2333\n\nQuickDraw Manager\nAvailable for: OS X Lion v10.7 to v10.7.5,\nOS X Lion Server v10.7 to v10.7.5,\nOS X Mountain Lion v10.8 to v10.8.2\nImpact: Opening a maliciously crafted PICT image may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of PICT\nimages. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2013-0975 : Tobias Klein working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5,\nOS X Mountain Lion v10.8 to v10.8.3\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of \u0027enof\u0027\natoms. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2013-0986 : Tom Gallagher (Microsoft) \u0026 Paul Bates (Microsoft)\nworking with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5,\nOS X Mountain Lion v10.8 to v10.8.3\nImpact: Viewing a maliciously crafted QTIF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the handling of\nQTIF files. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2013-0987 : roob working with iDefense VCP\n\nQuickTime\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.5, OS X Lion Server v10.7 to v10.7.5,\nOS X Mountain Lion v10.8 to v10.8.3\nImpact: Viewing a maliciously crafted FPX file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of FPX files. \nThis issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2013-0988 : G. Geshev working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: OS X Mountain Lion v10.8 to v10.8.3\nImpact: Playing a maliciously crafted MP3 file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of MP3 files. \nThis issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2013-0989 : G. Geshev working with HP\u0027s Zero Day Initiative\n\nRuby\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8\nImpact: Multiple vulnerabilities in Ruby on Rails\nDescription: Multiple vulnerabilities existed in Ruby on Rails, the\nmost serious of which may lead to arbitrary code execution on systems\nrunning Ruby on Rails applications. This issue may affect OS X\nLion or OS X Mountain Lion systems that were upgraded from Mac OS X\n10.6.8 or earlier. Users can update affected gems on such systems by\nusing the /usr/bin/gem utility. \nCVE-ID\nCVE-2013-0155\nCVE-2013-0276\nCVE-2013-0277\nCVE-2013-0333\nCVE-2013-1854\nCVE-2013-1855\nCVE-2013-1856\nCVE-2013-1857\n\nSMB\nAvailable for: OS X Lion v10.7 to v10.7.5,\nOS X Lion Server v10.7 to v10.7.5,\nOS X Mountain Lion v10.8 to v10.8.3\nImpact: An authenticated user may be able to write files outside the\nshared directory\nDescription: If SMB file sharing is enabled, an authenticated user\nmay be able to write files outside the shared directory. This issue\nwas addressed through improved access control. \nCVE-ID\nCVE-2013-0990 : Ward van Wanrooij\n\nNote: Starting with OS X 10.8.4, Java Web Start (i.e. JNLP)\napplications downloaded from the Internet need to be signed with\na Developer ID certificate. Gatekeeper will check downloaded\nJava Web Start applications for a signature and block such\napplications from launching if they are not properly signed. \n\nNote: OS X Mountain Lion v10.8.4 includes the content of\nSafari 6.0.5. For further details see \"About the security content\nof Safari 6.0.5\" at http://http//support.apple.com/kb/HT5785\n\nOS X Mountain Lion v10.8.4 and Security Update 2013-002 may be\nobtained from the Software Update pane in System Preferences,\nor Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nThe Software Update utility will present the update that applies\nto your system configuration. Only one is needed, either\nOS X Mountain Lion v10.8.4, or Security Update\n2013-002. \n\nFor OS X Mountain Lion v10.8.3\nThe download file is named: OSXUpd10.8.4.dmg\nIts SHA-1 digest is: 9cf99aa1293cefdac0fb9a24ea133c80f8237b5e\n\nFor OS X Mountain Lion v10.8 and v10.8.2\nThe download file is named: OSXUpdCombo10.8.4.dmg\nIts SHA-1 digest is: 3c95d0c8d0c7f43339a5f4e137e386dd5fe409c3\n\nFor OS X Lion v10.7.5\nThe download file is named: SecUpd2013-002.dmg\nIts SHA-1 digest is: cfc3bd0941d7c5838aee9e92ee087d78abff3ce7\n\nFor OS X Lion Server v10.7.5\nThe download file is named: SecUpdSrvr2013-002.dmg\nIts SHA-1 digest is: 34dff575a145e13404e7a2ee8a390d3e7c56fb5e\n\nFor Mac OS X v10.6.8\nThe download file is named: SecUpd2013-002.dmg\nIts SHA-1 digest is: 5da54b38ffb8c147925c3018a8f5bf30ad4ac5b1\n\nFor Mac OS X Server v10.6.8\nThe download file is named: SecUpdSrvr2013-002.dmg\nIts SHA-1 digest is: b20271f019930fe894c2247a6d5e05f00568b583\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\n+VoeoamqaQqZGyOiObbU\n=vG2v\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: Subscription Asset Manager 1.4 security update\nAdvisory ID: RHSA-2014:1863-01\nProduct: Red Hat Subscription Asset Manager\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-1863.html\nIssue date: 2014-11-17\nCVE Names: CVE-2013-1854 CVE-2013-1855 CVE-2013-1857 \n CVE-2013-4491 CVE-2013-6414 CVE-2013-6415 \n CVE-2014-0130 \n=====================================================================\n\n1. Summary:\n\nUpdated Subscription Asset Manager 1.4 packages that fix multiple security\nissues are now available. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Subscription Asset Manager for RHEL 6 Server - noarch\n\n3. Description:\n\nRed Hat Subscription Asset Manager acts as a proxy for handling\nsubscription information and software updates on client machines. Red Hat\nSubscription Asset Manager is built on Ruby on Rails, a\nmodel-view-controller (MVC) framework for web application development. \nAction Pack implements the controller and the view components. \n\nA directory traversal flaw was found in the way Ruby on Rails handled\nwildcard segments in routes with implicit rendering. A remote attacker\ncould use this flaw to retrieve arbitrary local files accessible to a Ruby\non Rails application using the aforementioned routes via a specially\ncrafted request. (CVE-2014-0130)\n\nA flaw was found in the way Ruby on Rails handled hashes in certain\nqueries. A remote attacker could use this flaw to perform a denial of\nservice (resource consumption) attack by sending specially crafted queries\nthat would result in the creation of Ruby symbols, which were never garbage\ncollected. (CVE-2013-1854)\n\nTwo cross-site scripting (XSS) flaws were found in Action Pack. A remote\nattacker could use these flaws to conduct XSS attacks against users of an\napplication using Action Pack. (CVE-2013-1855, CVE-2013-1857)\n\nIt was discovered that the internationalization component of Ruby on Rails\ncould, under certain circumstances, return a fallback HTML string that\ncontained user input. A remote attacker could possibly use this flaw to\nperform a reflective cross-site scripting (XSS) attack by providing a\nspecially crafted input to an application using the aforementioned\ncomponent. (CVE-2013-4491)\n\nA denial of service flaw was found in the header handling component of\nAction View. A remote attacker could send strings in specially crafted\nheaders that would be cached indefinitely, which would result in all\navailable system memory eventually being consumed. (CVE-2013-6414)\n\nIt was found that the number_to_currency Action View helper did not\nproperly escape the unit parameter. An attacker could use this flaw to\nperform a cross-site scripting (XSS) attack on an application that uses\ndata submitted by a user in the unit parameter. Upstream acknowledges Ben Murphy as the original reporter of\nCVE-2013-1854, Charlie Somerville as the original reporter of\nCVE-2013-1855, Alan Jenkins as the original reporter of CVE-2013-1857,\nPeter McLarnan as the original reporter of CVE-2013-4491, Toby Hsieh as the\noriginal reporter of CVE-2013-6414, and Ankit Gupta as the original\nreporter of CVE-2013-6415. \n\nAll Subscription Asset Manager users are advised to upgrade to these\nupdated packages, which contain backported patches to correct these issues. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n921329 - CVE-2013-1854 rubygem-activerecord: attribute_dos Symbol DoS vulnerability\n921331 - CVE-2013-1855 rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css\n921335 - CVE-2013-1857 rubygem-actionpack: sanitize_protocol: XSS Vulnerability in the helper of Ruby on Rails\n1036483 - CVE-2013-6414 rubygem-actionpack: Action View DoS\n1036910 - CVE-2013-6415 rubygem-actionpack: number_to_currency XSS\n1036922 - CVE-2013-4491 rubygem-actionpack: i18n missing translation XSS\n1095105 - CVE-2014-0130 rubygem-actionpack: directory traversal issue\n\n6. Package List:\n\nRed Hat Subscription Asset Manager for RHEL 6 Server:\n\nSource:\nkatello-1.4.3.28-1.el6sam_splice.src.rpm\nruby193-rubygem-actionmailer-3.2.17-1.el6sam.src.rpm\nruby193-rubygem-actionpack-3.2.17-6.el6sam.src.rpm\nruby193-rubygem-activemodel-3.2.17-1.el6sam.src.rpm\nruby193-rubygem-activerecord-3.2.17-5.el6sam.src.rpm\nruby193-rubygem-activeresource-3.2.17-1.el6sam.src.rpm\nruby193-rubygem-activesupport-3.2.17-2.el6sam.src.rpm\nruby193-rubygem-i18n-0.6.9-1.el6sam.src.rpm\nruby193-rubygem-mail-2.5.4-1.el6sam.src.rpm\nruby193-rubygem-rack-1.4.5-3.el6sam.src.rpm\nruby193-rubygem-rails-3.2.17-1.el6sam.src.rpm\nruby193-rubygem-railties-3.2.17-1.el6sam.src.rpm\n\nnoarch:\nkatello-common-1.4.3.28-1.el6sam_splice.noarch.rpm\nkatello-glue-candlepin-1.4.3.28-1.el6sam_splice.noarch.rpm\nkatello-glue-elasticsearch-1.4.3.28-1.el6sam_splice.noarch.rpm\nkatello-headpin-1.4.3.28-1.el6sam_splice.noarch.rpm\nkatello-headpin-all-1.4.3.28-1.el6sam_splice.noarch.rpm\nruby193-rubygem-actionmailer-3.2.17-1.el6sam.noarch.rpm\nruby193-rubygem-actionpack-3.2.17-6.el6sam.noarch.rpm\nruby193-rubygem-activemodel-3.2.17-1.el6sam.noarch.rpm\nruby193-rubygem-activerecord-3.2.17-5.el6sam.noarch.rpm\nruby193-rubygem-activeresource-3.2.17-1.el6sam.noarch.rpm\nruby193-rubygem-activesupport-3.2.17-2.el6sam.noarch.rpm\nruby193-rubygem-i18n-0.6.9-1.el6sam.noarch.rpm\nruby193-rubygem-mail-2.5.4-1.el6sam.noarch.rpm\nruby193-rubygem-rack-1.4.5-3.el6sam.noarch.rpm\nruby193-rubygem-rails-3.2.17-1.el6sam.noarch.rpm\nruby193-rubygem-railties-3.2.17-1.el6sam.noarch.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2013-1854\nhttps://access.redhat.com/security/cve/CVE-2013-1855\nhttps://access.redhat.com/security/cve/CVE-2013-1857\nhttps://access.redhat.com/security/cve/CVE-2013-4491\nhttps://access.redhat.com/security/cve/CVE-2013-6414\nhttps://access.redhat.com/security/cve/CVE-2013-6415\nhttps://access.redhat.com/security/cve/CVE-2014-0130\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFUai7iXlSAg2UNWIIRAmtEAJ9m+ZUXuva81fLz9G1CLKYi5aJoHACfcd3y\nSoVal0zNgx0pwtSAkS1q5/0=\n=i5aK\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2013-1855" }, { "db": "JVNDB", "id": "JVNDB-2013-001928" }, { "db": "BID", "id": "58552" }, { "db": "PACKETSTORM", "id": "129552" }, { "db": "PACKETSTORM", "id": "121005" }, { "db": "PACKETSTORM", "id": "121919" }, { "db": "PACKETSTORM", "id": "121052" }, { "db": "PACKETSTORM", "id": "129131" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-1855", "trust": 3.2 }, { "db": "JVN", "id": "JVNVU95174988", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU92046435", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-001928", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201303-354", "trust": 0.6 }, { "db": "BID", "id": "58552", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "129552", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121005", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121919", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121052", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129131", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "58552" }, { "db": "JVNDB", "id": "JVNDB-2013-001928" }, { "db": "PACKETSTORM", "id": "129552" }, { "db": "PACKETSTORM", "id": "121005" }, { "db": "PACKETSTORM", "id": "121919" }, { "db": "PACKETSTORM", "id": "121052" }, { "db": "PACKETSTORM", "id": "129131" }, { "db": "CNNVD", "id": "CNNVD-201303-354" }, { "db": "NVD", "id": "CVE-2013-1855" } ] }, "id": "VAR-201303-0424", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.24090908 }, "last_update_date": "2024-11-23T20:49:27.983000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2013-06-04-1", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "title": "APPLE-SA-2013-10-22-5", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html" }, { "title": "HT5784", "trust": 0.8, "url": "http://support.apple.com/kb/HT5784" }, { "title": "HT5999", "trust": 0.8, "url": "http://support.apple.com/kb/HT5999" }, { "title": "HT5784", "trust": 0.8, "url": "http://support.apple.com/kb/HT5784?viewlocale=ja_JP" }, { "title": "HT5999", "trust": 0.8, "url": "http://support.apple.com/kb/HT5999?viewlocale=ja_JP" }, { "title": "CVE-2013-1855 XSS vulnerability in sanitize_css in Action Pack", "trust": 0.8, "url": "https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/4_QHo4BqnN8" }, { "title": "openSUSE-SU-2013:0661", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html" }, { "title": "openSUSE-SU-2013:0662", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html" }, { "title": "[SEC] [ANN] Rails 3.2.13, 3.1.12, and 2.3.18 have been released!", "trust": 0.8, "url": "http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/" }, { "title": "RHSA-2014:1863", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2014-1863.html" }, { "title": "RHSA-2013:0698", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2013-0698.html" }, { "title": "Ruby on Rails \u2018sanitize_css()\u2019 Remediation measures for method cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=91843" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-001928" }, { "db": "CNNVD", "id": "CNNVD-201303-354" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-001928" }, { "db": "NVD", "id": "CVE-2013-1855" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://rhn.redhat.com/errata/rhsa-2013-0698.html" }, { "trust": 1.9, "url": "http://support.apple.com/kb/ht5784" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2014-1863.html" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html" }, { "trust": 1.6, "url": "http://weblog.rubyonrails.org/2013/3/18/sec-ann-rails-3-2-13-3-1-12-and-2-3-18-have-been-released/" }, { "trust": 1.6, "url": "http://lists.apple.com/archives/security-announce/2013/oct/msg00006.html" }, { "trust": 1.6, "url": "http://lists.apple.com/archives/security-announce/2013/jun/msg00000.html" }, { "trust": 1.6, "url": "https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source\u0026output=gplain" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1855" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu92046435/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95174988/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1855" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2013-1855" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921331" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2013:0698" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2014:1863" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1857" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1855" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1854" }, { "trust": 0.3, "url": "http://seclists.org/oss-sec/2013/q1/679" }, { "trust": 0.3, "url": "http://www.rubyonrails.com/" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21646819" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0155" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2932" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0276" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0333" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1856" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0277" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2930" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0447" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0448" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3933" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2929" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0276" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0333" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1856" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1857" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0156" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2930" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0156" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2931" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2932" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0446" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0449" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3186" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201412-28.xml" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2931" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2929" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0449" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0448" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3186" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0447" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3933" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0155" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0277" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1854" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3464" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3465" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4929" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1024" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0984" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0988" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://www.traud.de" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0989" }, { "trust": 0.1, "url": "http://www.openssl.org/news/" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2131" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0982" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0986" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "http://http//support.apple.com/kb/ht5785" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0987" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0990" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0975" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0985" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0983" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1857.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-1855.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/knowledge/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2013-1857" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6415" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2013-4491" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6414" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4491" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2013-1854" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0130" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-0130" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2013-6415" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2013-6414" } ], "sources": [ { "db": "BID", "id": "58552" }, { "db": "JVNDB", "id": "JVNDB-2013-001928" }, { "db": "PACKETSTORM", "id": "129552" }, { "db": "PACKETSTORM", "id": "121005" }, { "db": "PACKETSTORM", "id": "121919" }, { "db": "PACKETSTORM", "id": "121052" }, { "db": "PACKETSTORM", "id": "129131" }, { "db": "CNNVD", "id": "CNNVD-201303-354" }, { "db": "NVD", "id": "CVE-2013-1855" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "58552" }, { "db": "JVNDB", "id": "JVNDB-2013-001928" }, { "db": "PACKETSTORM", "id": "129552" }, { "db": "PACKETSTORM", "id": "121005" }, { "db": "PACKETSTORM", "id": "121919" }, { "db": "PACKETSTORM", "id": "121052" }, { "db": "PACKETSTORM", "id": "129131" }, { "db": "CNNVD", "id": "CNNVD-201303-354" }, { "db": "NVD", "id": "CVE-2013-1855" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-03-18T00:00:00", "db": "BID", "id": "58552" }, { "date": "2013-03-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-001928" }, { "date": "2014-12-15T20:00:42", "db": "PACKETSTORM", "id": "129552" }, { "date": "2013-03-29T01:47:56", "db": "PACKETSTORM", "id": "121005" }, { "date": "2013-06-06T14:44:44", "db": "PACKETSTORM", "id": "121919" }, { "date": "2013-04-02T14:44:00", "db": "PACKETSTORM", "id": "121052" }, { "date": "2014-11-17T23:30:56", "db": "PACKETSTORM", "id": "129131" }, { "date": "2013-03-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201303-354" }, { "date": "2013-03-19T22:55:01.027000", "db": "NVD", "id": "CVE-2013-1855" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-13T22:25:00", "db": "BID", "id": "58552" }, { "date": "2014-12-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-001928" }, { "date": "2023-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201303-354" }, { "date": "2024-11-21T01:50:31.663000", "db": "NVD", "id": "CVE-2013-1855" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "121052" }, { "db": "CNNVD", "id": "CNNVD-201303-354" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ruby on Rails of Action Pack Component cross-site scripting vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-001928" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xss", "sources": [ { "db": "PACKETSTORM", "id": "121052" }, { "db": "CNNVD", "id": "CNNVD-201303-354" } ], "trust": 0.7 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.