Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Vulnerability Alert

Ruby on Rails Action Pack Parameter Processing Remote Code Execution Vulnerability

 
Threat Type:CWE-20: Input Validation
IntelliShield ID:27831
Version:6
First Published:2013 January 10 20:51 GMT
Last Published:2013 May 29 19:46 GMT
Port: Not available
CVE:CVE-2013-0156
BugTraq ID:57187
Urgency:Possible use
Credibility:Confirmed
Severity:Moderate Damage
CVSS Base:10.0 CVSS Calculator
CVSS Version 2.0
CVSS Temporal:8.3
 
Version Summary:Additional information is available to address the Ruby on Rails action pack parameter processing remote code execution vulnerability.
 
 
Description
Ruby on Rails contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code.

The vulnerability is due to improper implementation of parameter-parsing code in the affected software. An unauthenticated, remote attacker could exploit the vulnerability by submitting crafted XML or YAML (YAML Ain't Markup Language) parameters to the affected software. A successful exploit could allow the attacker to execute arbitrary code in the security context of the vulnerable application. If the vulnerable application holds elevated privileges, the attacker could completely compromise the targeted system.

Functional code that exploits this vulnerability is publicly available as part of the Metasploit Framework.

Ruby on Rails has confirmed the vulnerability in a security announcement and released software updates.
 
Warning Indicators
Ruby on Rails versions prior to 3.2.11, 3.1.10, 3.0.19, and 2.3.15 are vulnerable.
 
IntelliShield Analysis
To exploit the vulnerability, the attacker must submit malicious requests to the system. In a typical network configuration, the attacker must have access to trusted, internal networks to submit malicious requests to the system. This access requirement could reduce the likelihood of a successful exploit.

Ruby on Rails reports there is no fix for YAML object injection. Administrators are advised to immediately disable YAML parameter parsing if it has been enabled.

Due to the widespread deployment and usage of Ruby on Rails and the public availability of functional exploit code, Administrators are advised to upgrade or patch affected systems immediately.

Event data from Cisco has detected intrusion prevention system signature activity related to this vulnerability. This activity on May 24th, 2013, could indicate increased attempts to exploit the vulnerability in Ruby on Rails.
 
Vendor Announcements
Ruby on Rails has released a security announcement and a release announcement at the following links:

Multiple vulnerabilities in parameter parsing in Action Pack
Rails 3.2.11, 3.1.10, 3.0.19, and 2.3.15 have been released!

Apple has released security advisories at the following links: HT5644 and HT5672

FreeBSD has released a VuXML document at the following link: rubygem-rails – multiple vulnerabilities

Red Hat has released an official CVE statement and security advisories for bug 892870 at the following links: CVE-2013-0156, RHSA-2013:0153, RHSA-2013:0154, and RHSA-2013-0155

US-CERT has released Vulnerability Note VU#380039 at the following link: Ruby on Rails Action Pack framework insecurely typecasts YAML and Symbol XML parameters
 
Impact
An unauthenticated, remote attacker could exploit the vulnerability to execute arbitrary code in the security context of the vulnerable application. If the vulnerable application holds elevated privileges, the attacker could completely compromise the targeted system.
 
Technical Information
The vulnerability is due to insufficient validation and sanitization of user-supplied input to the parameter-parsing code in the affected software. The vulnerable code could allow a Ruby on Rails application to automatically cast values from strings to certain data types. The type casting code improperly supports certain conversions on user-supplied data which could result in symbol creation and YAML parsing.

An unauthenticated, remote attacker could exploit the vulnerability by submitting crafted parameters to the Ruby on Rails XML request processor. A successful exploit could allow the attacker to instantiate a remote object, which could execute arbitrary Ruby code in the security context of the vulnerable application. If the vulnerable application holds elevated privileges, the attacker could completely compromise the targeted system. Additionally, the attacker may be able to bypass authentication systems, inject arbitrary SQL or cause a targeted application to terminate abnormally, resulting in a denial of service (DoS) condition for legitimate users.
 
Safeguards
Administrators are advised to apply the appropriate updates.

Administrators may consider disabling XML parsing in the vulnerable applications.

Administrators may consider removing YAML and Symbol support from the XML parser if XML parsing functionality is required.

Administrators are advised to immediately disable YAML parameter parsing if it has been enabled. Ruby on Rails reports there is no fix for YAML object injection.

Administrators are advised to monitor affected systems.
 
Patches/Software
Ruby on Rails has released updated software at the following link: Ruby on Rails versions 3.2.11, 3.1.10, 3.0.19, and 2.3.15

Ruby on Rails has released patches for users unable to upgrade at the following links:

2-3-xml_parsing.patch
3-0-xml_parsing.patch
3-1-xml_parsing.patch
3-2-xml_parsing.patch

Apple has released updated software for the registered users at the following links:

Mac OS X Server version 2.2.1
Security Update 2013-001 Server (Snow Leopard)
Security Update 2013-001 Server (Lion)

FreeBSD releases ports collection updates at the following link: Ports Collection Index

Red Hat has released updated software for registered subscribers at the following link: Red Hat Network

Red Hat packages can be updated on Red Hat Enterprise Linux versions 5 and later using the yum tool.

Signatures
 
Cisco Intrusion Prevention System (IPS) 6.0
Signature IDSignature NameReleaseLatest Release Date
1802/0Ruby on Rails Remote Code Execution VulnerabilityS6892013 Jan 15 
 
Alert History
 

Version 5, March 18, 2013, 6:18 PM: Apple has released an additional security advisory and updated software to address the Ruby on Rails action pack parameter processing remote code execution vulnerability.

Version 4, February 5, 2013, 5:45 AM: Apple has released a security advisory and updated software to address the Ruby on Rails action pack parameter processing remote code execution vulnerability

Version 3, January 14, 2013, 8:21 AM: Red Hat has released an additional security advisory and updated packages to address the ruby on rails action pack parameter processing remote code execution vulnerability.

Version 2, January 11, 2013, 6:52 AM: Red Hat has released a security advisory and updated packages to address the ruby on rails action pack parameter processing remote code execution vulnerability.

Version 1, January 10, 2013, 11:51 PM: Ruby on Rails contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. Updates are available.


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
Hansson, David HeinemeierRails 2.3 .0, .1, .2, .3, .4, .5, .6, .7, .8, .9, .10, .11, .12, .13, .14 | 3.0 .0, .1, .2, .3, .4, .5, .6, .7, .8, .9, .10, .11, .12, .13, .14, .15, .16, .17, .18 | 3.1 .0, .1, .2, .3, .4, .5, .6, .7, .8, .9 | 3.2 .0, .1, .2, .3, .4, .5, .6, .7, .8, .9, .10

Associated Products:
AppleMac OS X 10.8 Base, .1 | 10.8.1 Base | 10.8.2 Base
AppleMac OS X Server 10.6.6 Base | 10.6.7 Base | 10.6.8 Base | 10.7 Base | 10.7.1 Base | 10.7.2 Base | 10.7.3 Base | 10.7.4 Base | 10.7.5 Base | 10.8.0 Base | 10.8.1 Base | 10.8.2 Base
FreeBSD ProjectFreeBSD 8.0 Base | 8.1 Base | 8.2 Base | 8.3 Base | 9.0 Base | 9.1 Base
Red Hat, Inc.Red Hat CloudForms x86 Base
Red Hat, Inc.Red Hat OpenShift Enterprise x86_64 Base
Red Hat, Inc.Red Hat Subscription Asset Manager 1.0 x86_64 | 1.1 x86_64




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield