Skip to content

Improper Input Validation in multi_xml

High severity GitHub Reviewed Published Oct 24, 2017 to the GitHub Advisory Database • Updated Oct 10, 2023

Package

bundler multi_xml (RubyGems)

Affected versions

< 0.5.2

Patched versions

0.5.2

Description

multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

References

Published by the National Vulnerability Database Apr 25, 2013
Published to the GitHub Advisory Database Oct 24, 2017
Reviewed Jun 16, 2020
Last updated Oct 10, 2023

Severity

High

EPSS score

5.700%
(94th percentile)

Weaknesses

CVE ID

CVE-2013-0175

GHSA ID

GHSA-pchc-949f-53m5

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.