Summary
It was discovered that Rails, the Ruby web application development framework, performed insufficient validation on input parameters, allowing unintended type conversions. An attacker may use this to bypass authentication systems, inject arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on the application.
Solution
For the stable distribution (squeeze), this problem has been fixed in version 2.3.5-1.2+squeeze4.1.
For the testing distribution (wheezy) and unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your rails packages.
Insight
Rails is a full-stack, open-source web framework in Ruby for writing real-world applications.
Affected
rails on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-0156 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities