CVE-2013-0156
EXPLOITEDRuby on Rails JSON Processor YAML Deserialization Code Execution
Title source: metasploitDescription
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
Exploits (13)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/27527
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/24019
nomisec
WORKING POC
5 stars
by bsodmike · poc
https://github.com/bsodmike/rails-exploit-cve-2013-0156
metasploit
SCANNER
by hdm, jjarmoc · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/rails_xml_yaml_scanner.rb
metasploit
WORKING POC
EXCELLENT
rubypocruby
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/rails_secret_deserialization.rb
metasploit
WORKING POC
EXCELLENT
by charliesome, espes, lian, hdm · rubypocruby
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/rails_xml_yaml_code_exec.rb
References (14)
Scores
EPSS
0.9191
EPSS Percentile
99.7%
Details
VulnCheck KEV
2013-05-28
CWE
CWE-20
Status
published
Products (5)
debian/debian_linux
6.0
debian/debian_linux
7.0
rubygems/actionpack
0 - 2.3.15RubyGems
rubyonrails/rails
3.2.0 - 3.2.11
rubyonrails/ruby_on_rails
< 2.3.15
Published
Jan 13, 2013
Tracked Since
Feb 18, 2026