Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-0269

EPSS 15.42% · P95
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-0269

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
JSON gem 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
JSON gem 1.7.7之前的1.7.x版本,1.6.8之前的1.6.x版本,以及1.5.5之前的1.5.x版本中存在漏洞。通过特制的JSON文档触发对任意Ruby符号或某内部对象的创建,比如实施针对Ruby on Rails的SQL注入攻击,远程攻击者可利用该漏洞导致拒绝服务(资源耗尽)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-0269

#POC DescriptionSource LinkShenlong Link
1Inspect all of your Heroku apps for vulnerable versions of the JSON gemhttps://github.com/heroku/heroku-CVE-2013-0269POC Details
2Inspect all of your Heroku apps for vulnerable versions of the JSON gemhttps://github.com/danring/heroku-CVE-2013-0269POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-0269

登录查看更多情报信息。

Same Patch Batch · n/a · 2013-02-13 · 79 CVEs total

CVE-2013-1262Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1263Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1277Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1265Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1266Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1264Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1261Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1260Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1259Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1258Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1267Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1268Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1269Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1270Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1271Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1272Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1273Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1274Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1275Microsoft Windows ‘win32k.sys’竞争条件漏洞
CVE-2013-1276Microsoft Windows ‘win32k.sys’竞争条件漏洞

Showing top 20 of 79 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2013-0269

No comments yet


Leave a comment