BSON injection vulnerability in the legal? function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string.
References
Link | Resource |
---|---|
https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html | Exploit Patch Third Party Advisory |
https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7 | Issue Tracking Patch Third Party Advisory |
https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1229750 | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/75045 | VDB Entry Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/06/06/3 | Mailing List |
Configurations
Information
Published : 2018-02-05 08:29
Updated : 2018-03-13 12:49
NVD link : CVE-2015-4412
Mitre link : CVE-2015-4412
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
bson_project
- bson