目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2013-0156— Ruby on Rails 输入验证错误漏洞

EPSS 91.91% · P100
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2013-0156 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Ruby on Rails 输入验证错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Ruby on Rails是美国Rails团队的一套基于Ruby语言的开源Web应用框架。 Ruby on Rails存在输入验证错误漏洞,该漏洞源于没有正确限制字符串值的转换 ,允许远程攻击者进行注入并执行任意代码。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

神龙十问 — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

受影响产品

厂商产品影响版本CPE订阅
-n/a n/a -

二、漏洞 CVE-2013-0156 的公开POC

#POC 描述源链接神龙链接
1Silly Rails App to demonstrate vuln CVE-2013-0156https://github.com/terracatta/name_reverserPOC详情
2Inspect all of your heroku apps to see if they are running a vulnerable version of Railshttps://github.com/heroku/heroku-CVE-2013-0156POC详情
3crack repo from jnunemaker but with version 0.1.8 and rails CVE-2013-0156 vulnerability fixedhttps://github.com/josal/crack-0.1.8-fixedPOC详情
4Bootstrapped Rails 3.2.10 to test the remote code exploit CVE-2013-0156https://github.com/bsodmike/rails-exploit-cve-2013-0156POC详情
5Arbitrary deserialization that can be used to trigger SQL injection and even Code executionhttps://github.com/R3dKn33-zz/CVE-2013-0156POC详情
6Pseudo shell for CVE-2013-0156. https://github.com/Jjdt12/kuang_grade_mk11POC详情
7This script is specifically designed to solve the challenge on PentesterLab for the CVE-2013-0156 exploithttps://github.com/oxBEN10/CVE-2013-0156POC详情
8This script is specifically designed to solve the challenge on PentesterLab for the CVE-2013-0156 exploithttps://github.com/oxben10/CVE-2013-0156POC详情
9Infoblox NetMRI virtual appliances before version 7.6.1 are vulnerable to remote code execution (RCE) due to the use of a hardcoded Ruby on Rails session cookie secret key. The Rails web component deserializes session cookies if the signing key is valid. Attackers with knowledge of this key can craft malicious session cookies that are deserialized by the application, leading to arbitrary code execution. This vulnerability is related to the known Ruby on Rails deserialization flaw (CVE-2013-0156). Infoblox did not assign a new CVE for this issue, as it is a result of the underlying Rails vulnerability. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/infoblox/infoblox-netmri-rails-cookie-rce.yamlPOC详情
10Modified ruby script for RCEhttps://github.com/7s26simon/CVE-2013-0156POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2013-0156 的情报信息

Please 登录 to view more intelligence information

同批安全公告 · n/a · 2013-01-13 · 共 29 条

CVE-2013-0757Mozilla Firefox/Thunderbird/SeaMonkey COW绕过权限提升漏洞
CVE-2013-0771Mozilla Firefox/Thunderbird/SeaMonkey 基于堆的缓冲区错误漏洞
CVE-2013-0770Mozilla Firefox/Thunderbird/SeaMonkey 内存破坏漏洞
CVE-2013-0769Mozilla Firefox/Thunderbird/SeaMonkey 内存破坏漏洞
CVE-2013-0768Mozilla Firefox/Thunderbird/SeaMonkey Canvas缓冲区错误漏洞
CVE-2013-0767Mozilla Firefox/Thunderbird/SeaMonkey 越界读取漏洞
CVE-2013-0766Mozilla Firefox/Thunderbird/SeaMonkey 释放后使用漏洞
CVE-2013-0764Mozilla Firefox/Thunderbird/SeaMonkey 任意代码执行漏洞
CVE-2013-0763Mozilla Firefox/Thunderbird/SeaMonkey Mesa释放后使用漏洞
CVE-2013-0762Mozilla Firefox/Thunderbird/SeaMonkey 释放后使用漏洞
CVE-2013-0761Mozilla Firefox/Thunderbird/SeaMonkey 释放后使用漏洞
CVE-2013-0760Mozilla Firefox/Thunderbird/SeaMonkey 缓冲区错误漏洞
CVE-2013-0759Mozilla Firefox/SeaMonkey/Thunderbird 地址栏欺骗漏洞
CVE-2013-0758Mozilla Firefox/Thunderbird/SeaMonkey 权限提升漏洞
CVE-2013-0155Ruby on Rails 不安全查询生成漏洞
CVE-2013-0756Mozilla Firefox/Thunderbird/SeaMonkey ‘obj_toSource’函数释放后使用漏洞
CVE-2013-0755Mozilla Firefox/Thunderbird/SeaMonkey Vibrate释放后使用漏洞
CVE-2013-0754Mozilla Firefox/Thunderbird/SeaMonkey 释放后使用漏洞
CVE-2013-0753Mozilla Firefox/Thunderbird/SeaMonkey ‘serializeToStream’释放后使用漏洞
CVE-2013-0752Mozilla Firefox/Thunderbird/SeaMonkey XBL处理内存破坏漏洞

显示前 20 条,共 29 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2013-0156

暂无评论


发表评论