Description
The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference.
Remediation
References
https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source&output=gplain
http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
http://support.apple.com/kb/HT5784
http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
Related Vulnerabilities
CVE-2018-1294 Vulnerability in maven package org.apache.commons:commons-email
CVE-2011-5034 Vulnerability in maven package org.apache.geronimo.modules:geronimo-tomcat6
CVE-2017-9791 Vulnerability in maven package org.apache.struts:struts2-struts1-plugin
CVE-2018-25031 Vulnerability in maven package org.webjars.bower:swagger-ui
CVE-2022-26336 Vulnerability in maven package org.apache.poi:poi-scratchpad