Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

Related vulnerabilities

GSD-2013-7224

Vulnerability from gsd - Updated: 2013-12-24 00:00
Details
Fat Free CRM contains a flaw in user controllers that is triggered as JSON requests are rendered with a full JSON object. This may allow a remote attacker to gain access to potentially sensitive information e.g. other users password hashes.
Aliases

{
  "GSD": {
    "alias": "CVE-2013-7224",
    "description": "Fat Free CRM before 0.12.1 does not restrict JSON serialization, which allows remote attackers to obtain sensitive information via a direct request, as demonstrated by a request for users/1.json.",
    "id": "GSD-2013-7224"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "affected": [
        {
          "package": {
            "ecosystem": "RubyGems",
            "name": "fat_free_crm",
            "purl": "pkg:gem/fat_free_crm"
          }
        }
      ],
      "aliases": [
        "CVE-2013-7224",
        "OSVDB-101447"
      ],
      "details": "Fat Free CRM contains a flaw in user controllers that is triggered as JSON\nrequests are rendered with a full JSON object. This may allow a remote\nattacker to gain access to potentially sensitive information e.g. other\nusers password hashes.\n",
      "id": "GSD-2013-7224",
      "modified": "2013-12-24T00:00:00.000Z",
      "published": "2013-12-24T00:00:00.000Z",
      "references": [
        {
          "type": "WEB",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7224"
        }
      ],
      "schema_version": "1.4.0",
      "severity": [
        {
          "score": 5.0,
          "type": "CVSS_V2"
        }
      ],
      "summary": "Fat Free CRM Gem for Ruby allows remote attackers to obtain sensitive informations"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2013-7224",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Fat Free CRM before 0.12.1 does not restrict JSON serialization, which allows remote attackers to obtain sensitive information via a direct request, as demonstrated by a request for users/1.json."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "20131224 Happy Holidays / Xmas Advisory",
            "refsource": "FULLDISC",
            "url": "http://seclists.org/fulldisclosure/2013/Dec/199"
          },
          {
            "name": "[oss-security] 20131228 Re: CVE request: Fat Free CRM multiple vulnerabilities",
            "refsource": "MLIST",
            "url": "http://openwall.com/lists/oss-security/2013/12/28/2"
          },
          {
            "name": "http://www.phenoelit.org/stuff/ffcrm.txt",
            "refsource": "MISC",
            "url": "http://www.phenoelit.org/stuff/ffcrm.txt"
          },
          {
            "name": "https://github.com/fatfreecrm/fat_free_crm/commit/cf26a04b356ad2161c4c6160260eb870a3de5328",
            "refsource": "CONFIRM",
            "url": "https://github.com/fatfreecrm/fat_free_crm/commit/cf26a04b356ad2161c4c6160260eb870a3de5328"
          },
          {
            "name": "https://github.com/fatfreecrm/fat_free_crm/issues/300",
            "refsource": "CONFIRM",
            "url": "https://github.com/fatfreecrm/fat_free_crm/issues/300"
          },
          {
            "name": "https://github.com/fatfreecrm/fat_free_crm/wiki/Fixing-security-vulnerabilities-%2827th-Dec-2013%29",
            "refsource": "CONFIRM",
            "url": "https://github.com/fatfreecrm/fat_free_crm/wiki/Fixing-security-vulnerabilities-%2827th-Dec-2013%29"
          }
        ]
      }
    },
    "github.com/rubysec/ruby-advisory-db": {
      "cve": "2013-7224",
      "cvss_v2": 5.0,
      "date": "2013-12-24",
      "description": "Fat Free CRM contains a flaw in user controllers that is triggered as JSON\nrequests are rendered with a full JSON object. This may allow a remote\nattacker to gain access to potentially sensitive information e.g. other\nusers password hashes.\n",
      "gem": "fat_free_crm",
      "osvdb": 101447,
      "patched_versions": [
        "\u003e= 0.13.0",
        "~\u003e 0.12.1"
      ],
      "title": "Fat Free CRM Gem for Ruby allows remote attackers to obtain sensitive informations",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7224"
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003e=0.0.0 \u003c0.12.1",
          "affected_versions": "All versions starting from 0.0.0 before 0.12.1",
          "credit": "Steve Kenworthy",
          "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "cwe_ids": [
            "CWE-1035",
            "CWE-200",
            "CWE-937"
          ],
          "date": "2014-01-03",
          "description": "The `users` controller renders JSON requests with a full JSON object.",
          "fixed_versions": [
            "0.12.1",
            "0.13.0"
          ],
          "identifier": "CVE-2013-7224",
          "identifiers": [
            "CVE-2013-7224"
          ],
          "package_slug": "gem/fat_free_crm",
          "pubdate": "2014-01-02",
          "solution": "Upgrade to latest",
          "title": "Default to_json for models",
          "urls": [
            "http://seclists.org/fulldisclosure/2013/Dec/199"
          ],
          "uuid": "aa45db28-39b7-4319-aed8-851360aa9780"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:fatfreecrm:fat_free_crm:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.12.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.9.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.9.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.11.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.10.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.9.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.11.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.9.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.9.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7224"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Fat Free CRM before 0.12.1 does not restrict JSON serialization, which allows remote attackers to obtain sensitive information via a direct request, as demonstrated by a request for users/1.json."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-200"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.phenoelit.org/stuff/ffcrm.txt",
              "refsource": "MISC",
              "tags": [
                "Exploit"
              ],
              "url": "http://www.phenoelit.org/stuff/ffcrm.txt"
            },
            {
              "name": "20131224 Happy Holidays / Xmas Advisory",
              "refsource": "FULLDISC",
              "tags": [],
              "url": "http://seclists.org/fulldisclosure/2013/Dec/199"
            },
            {
              "name": "https://github.com/fatfreecrm/fat_free_crm/wiki/Fixing-security-vulnerabilities-%2827th-Dec-2013%29",
              "refsource": "CONFIRM",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "https://github.com/fatfreecrm/fat_free_crm/wiki/Fixing-security-vulnerabilities-%2827th-Dec-2013%29"
            },
            {
              "name": "https://github.com/fatfreecrm/fat_free_crm/issues/300",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "https://github.com/fatfreecrm/fat_free_crm/issues/300"
            },
            {
              "name": "https://github.com/fatfreecrm/fat_free_crm/commit/cf26a04b356ad2161c4c6160260eb870a3de5328",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "https://github.com/fatfreecrm/fat_free_crm/commit/cf26a04b356ad2161c4c6160260eb870a3de5328"
            },
            {
              "name": "[oss-security] 20131228 Re: CVE request: Fat Free CRM multiple vulnerabilities",
              "refsource": "MLIST",
              "tags": [],
              "url": "http://openwall.com/lists/oss-security/2013/12/28/2"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "exploitabilityScore": 10.0,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2014-01-03T16:58Z",
      "publishedDate": "2014-01-02T14:59Z"
    }
  }
}