mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-08 11:36:33 +00:00
32 lines
1.5 KiB
Markdown
32 lines
1.5 KiB
Markdown
![]() |
### [CVE-2013-0269](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/JERRY123S/all-poc
|
||
|
- https://github.com/RClueX/Hackerone-Reports
|
||
|
- https://github.com/cyberanand1337x/bug-bounty-2022
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/heroku/heroku-CVE-2013-0269
|
||
|
- https://github.com/hktalent/TOP
|
||
|
- https://github.com/holmes-py/reports-summary
|
||
|
- https://github.com/imhunterand/hackerone-publicy-disclosed
|
||
|
- https://github.com/jbmihoub/all-poc
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/soosmile/POC
|
||
|
- https://github.com/weeka10/-hktalent-TOP
|
||
|
|