openSUSE 安全性更新:ruby (openSUSE-SU-2013:0278-1)

high Nessus Plugin ID 74881

概要

遠端 openSUSE 主機缺少安全性更新。

說明

此更新程式將 RubyOnRails 2.3 堆疊更新至 2.3.16 版,並且將 RubyOnRails 3.2 堆疊更新至 3.2.11 版。

完成最重要的安全性和錯誤修正:CVE-2013-0333:修正 JSON sql/程式碼插入問題。CVE-2012-5664:修正 Active Record 中的一個 SQL 插入弱點。CVE-2012-2695:修正一個透過條件式巢狀雜湊導致的 SQL 插入。CVE-2013-0155:
在 Rails 的 Ruby 中修正不安全的查詢產生風險。
CVE-2013-0156:修正 Action Pack 中的多個參數剖析弱點。

解決方案

更新受影響的 ruby 套件。

另請參閱

https://bugzilla.novell.com/show_bug.cgi?id=766792

https://bugzilla.novell.com/show_bug.cgi?id=775649

https://bugzilla.novell.com/show_bug.cgi?id=775653

https://bugzilla.novell.com/show_bug.cgi?id=796712

https://bugzilla.novell.com/show_bug.cgi?id=797449

https://bugzilla.novell.com/show_bug.cgi?id=797452

https://bugzilla.novell.com/show_bug.cgi?id=798452

https://bugzilla.novell.com/show_bug.cgi?id=798458

https://bugzilla.novell.com/show_bug.cgi?id=800320

https://lists.opensuse.org/opensuse-updates/2013-02/msg00030.html

Plugin 詳細資訊

嚴重性: High

ID: 74881

檔案名稱: openSUSE-2013-106.nasl

版本: 1.8

類型: local

代理程式: unix

已發布: 2014/6/13

已更新: 2021/1/19

支援的感應器: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

風險資訊

VPR

風險因素: High

分數: 7.4

CVSS v2

風險因素: High

基本分數: 7.5

時間分數: 6.2

媒介: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

弱點資訊

CPE: p-cpe:/a:novell:opensuse:rubygem-actionmailer, p-cpe:/a:novell:opensuse:rubygem-actionmailer-2_3, p-cpe:/a:novell:opensuse:rubygem-actionmailer-2_3-testsuite, p-cpe:/a:novell:opensuse:rubygem-actionmailer-3_2, p-cpe:/a:novell:opensuse:rubygem-actionpack, p-cpe:/a:novell:opensuse:rubygem-actionpack-2_3, p-cpe:/a:novell:opensuse:rubygem-actionpack-2_3-testsuite, p-cpe:/a:novell:opensuse:rubygem-actionpack-3_2, p-cpe:/a:novell:opensuse:rubygem-activemodel-3_2, p-cpe:/a:novell:opensuse:rubygem-activerecord, p-cpe:/a:novell:opensuse:rubygem-activerecord-2_3, p-cpe:/a:novell:opensuse:rubygem-activerecord-2_3-testsuite, p-cpe:/a:novell:opensuse:rubygem-activerecord-3_2, p-cpe:/a:novell:opensuse:rubygem-activeresource, p-cpe:/a:novell:opensuse:rubygem-activeresource-2_3, p-cpe:/a:novell:opensuse:rubygem-activeresource-2_3-testsuite, p-cpe:/a:novell:opensuse:rubygem-activeresource-3_2, p-cpe:/a:novell:opensuse:rubygem-activesupport, p-cpe:/a:novell:opensuse:rubygem-activesupport-2_3, p-cpe:/a:novell:opensuse:rubygem-activesupport-3_2, p-cpe:/a:novell:opensuse:rubygem-rack-1_1, p-cpe:/a:novell:opensuse:rubygem-rack-1_1-testsuite, p-cpe:/a:novell:opensuse:rubygem-rack-1_2, p-cpe:/a:novell:opensuse:rubygem-rack-1_2-testsuite, p-cpe:/a:novell:opensuse:rubygem-rack-1_3, p-cpe:/a:novell:opensuse:rubygem-rack-1_3-testsuite, p-cpe:/a:novell:opensuse:rubygem-rack-1_4, p-cpe:/a:novell:opensuse:rubygem-rack-1_4-testsuite, p-cpe:/a:novell:opensuse:rubygem-rails, p-cpe:/a:novell:opensuse:rubygem-rails-2_3, p-cpe:/a:novell:opensuse:rubygem-rails-3_2, p-cpe:/a:novell:opensuse:rubygem-railties-3_2, p-cpe:/a:novell:opensuse:rubygem-sprockets-2_2, cpe:/o:novell:opensuse:12.1, cpe:/o:novell:opensuse:12.2

必要的 KB 項目: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2013/2/4

可惡意利用

Metasploit (Ruby on Rails JSON Processor YAML Deserialization Code Execution)

參考資訊

CVE: CVE-2012-2695, CVE-2012-6496, CVE-2013-0155, CVE-2013-0156, CVE-2013-0333