{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2013-03-18T00:00:00.000Z","descriptions":[{"lang":"en","value":"The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2014-12-09T18:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"openSUSE-SU-2013:0667","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html"},{"name":"APPLE-SA-2013-10-22-5","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"},{"name":"openSUSE-SU-2013:0659","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html"},{"name":"openSUSE-SU-2013:0660","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.apple.com/kb/HT5784"},{"name":"APPLE-SA-2013-06-04-1","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"},{"name":"RHSA-2014:1863","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2014-1863.html"},{"name":"openSUSE-SU-2013:0664","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html"},{"name":"openSUSE-SU-2013:0668","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html"},{"name":"[ruby-security-ann] 20130318 [CVE-2013-1854] Symbol DoS vulnerability in Active Record","tags":["mailing-list","x_refsource_MLIST"],"url":"https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain"},{"name":"RHSA-2013:0699","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0699.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T15:20:36.703Z"},"title":"CVE Program Container","references":[{"name":"openSUSE-SU-2013:0667","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html"},{"name":"APPLE-SA-2013-10-22-5","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"},{"name":"openSUSE-SU-2013:0659","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html"},{"name":"openSUSE-SU-2013:0660","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.apple.com/kb/HT5784"},{"name":"APPLE-SA-2013-06-04-1","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"},{"name":"RHSA-2014:1863","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2014-1863.html"},{"name":"openSUSE-SU-2013:0664","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html"},{"name":"openSUSE-SU-2013:0668","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html"},{"name":"[ruby-security-ann] 20130318 [CVE-2013-1854] Symbol DoS vulnerability in Active Record","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain"},{"name":"RHSA-2013:0699","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0699.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2013-1854","datePublished":"2013-03-19T22:00:00.000Z","dateReserved":"2013-02-19T00:00:00.000Z","dateUpdated":"2024-08-06T15:20:36.703Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}