The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html | third party advisory exploit |
https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html | third party advisory exploit |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html | third party advisory mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=1229757 | issue tracking third party advisory |
http://www.openwall.com/lists/oss-security/2015/06/06/3 | third party advisory mailing list |
http://www.securityfocus.com/bid/75045 | vdb entry third party advisory |
https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24 | exploit |
https://seclists.org/oss-sec/2015/q2/653 | third party advisory mailing list |
https://www.securityfocus.com/bid/75045 | vdb entry third party advisory |