Skip to content

HTTParty does not restrict casts of string values

High severity GitHub Reviewed Published Oct 24, 2017 to the GitHub Advisory Database • Updated Nov 10, 2023

Package

bundler httparty (RubyGems)

Affected versions

<= 0.9.0

Patched versions

0.10.0

Description

The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156.

References

Published by the National Vulnerability Database Apr 9, 2013
Published to the GitHub Advisory Database Oct 24, 2017
Reviewed Jun 16, 2020
Last updated Nov 10, 2023

Severity

High

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(86th percentile)

Weaknesses

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. Learn more on MITRE.

CVE ID

CVE-2013-1801

GHSA ID

GHSA-mgx3-27hr-mfgp

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.