Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-0333 PoC — Ruby on Rails 安全漏洞

Source
Associated Vulnerability
Title:Ruby on Rails 安全漏洞 (CVE-2013-0333)
Description:lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
Readme
heroku-CVE-2013-0333
===

Inspect all of your heroku apps to see if they are running a vulnerable version of Rails

Background
---

A [serious security
vulnerability](http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/)
has been found in the [Ruby on Rails](http://rubyonrails.org)
framework. This exploit affects nearly all applications running Rails
versions 2.3 and 3.0, and a patch has been made available.

Rails developers can get a full list of all your affected Heroku applications by running [this script](https://github.com/heroku/heroku-CVE-2013-0333/blob/master/heroku-CVE-2013-0333.rb). The following Rails versions have been patched and deemed safe from this exploit:

- 3.0.20
- 2.3.16
- 3.2.x
- 3.1.x


**If you do not upgrade, an attacker can trivially gain access to your
  application, its data, and run arbitrary code or commands. Heroku
  recommends upgrading to a patched version immediately.**

Instructions
---

```sh
$ git clone git@github.com:heroku/heroku-CVE-2013-0333.git
$ cd heroku-CVE-2013-0333
$ ruby heroku-CVE-2013-0333.rb
```

PGP Signature
---
The Heroku Security Team's PGP key is available at [https://policy.heroku.com/security](https://policy.heroku.com/security)
File Snapshot

[4.0K] /data/pocs/182dccb41eef3693cc14121e84810c27ac1af328 ├── [1.5K] heroku-CVE-2013-0333.rb ├── [ 535] heroku-CVE-2013-0333.rb.asc └── [1.2K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →