Description
The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156.
References (4)
Core 4
Core References
Exploit, Patch x_refsource_confirm
https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031
Various Sources x_refsource_misc
https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately
Issue Tracking x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=917229
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/58260
Scores
EPSS
0.0299
EPSS Percentile
86.6%
Details
CWE
CWE-264
Status
published
Products (47)
jnunemaker/httparty
0.1.0
jnunemaker/httparty
0.1.1
jnunemaker/httparty
0.1.2
jnunemaker/httparty
0.1.3
jnunemaker/httparty
0.1.5
jnunemaker/httparty
0.1.6
jnunemaker/httparty
0.1.7
jnunemaker/httparty
0.1.8
jnunemaker/httparty
0.2.0
jnunemaker/httparty
0.2.1
... and 37 more
Published
Apr 09, 2013
Tracked Since
Feb 18, 2026