Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-0269 PoC — JSON gem 输入验证错误漏洞

Source
Associated Vulnerability
Title:JSON gem 输入验证错误漏洞 (CVE-2013-0269)
Description:JSON gem 1.7.7之前的1.7.x版本,1.6.8之前的1.6.x版本,以及1.5.5之前的1.5.x版本中存在漏洞。通过特制的JSON文档触发对任意Ruby符号或某内部对象的创建,比如实施针对Ruby on Rails的SQL注入攻击,远程攻击者可利用该漏洞导致拒绝服务(资源耗尽)。
Description
Inspect all of your Heroku apps for vulnerable versions of the JSON gem
Readme
heroku-CVE-2013-0269
===

Inspect all of your heroku apps to see if they are running a vulnerable version of JSON

Background
---

A [security vulnerability](https://groups.google.com/forum/#!topic/rubyonrails-security/4_YvCpLzL58/discussion) has been found in the Ruby
JSON gem. This is the root cause for the recently-announced MySQL
injection issue in Rails. A new release of the JSON gem is available.

Developers can get a full list of all your affected Heroku
applications by running [this
script](https://github.com/heroku/heroku-CVE-2013-0269/blob/master/heroku-CVE-2013-0269.rb).
The following JSON versions have been patched and deemed safe from
this exploit:

- 1.7.7
- 1.6.8
- 1.5.5

**If you do not upgrade, an attacker may be able to execute arbitrary
  SQL queries on your application's MySQL database. Heroku recommends
  upgrading to a patched version immediately.**

Instructions
---

* git clone git@github.com:heroku/heroku-CVE-2013-0269.git
* cd heroku-CVE-2013-0269
* ruby heroku-CVE-2013-0269.rb

PGP Signature
---
The Heroku Security Team's PGP key is available at [https://policy.heroku.com/security](https://policy.heroku.com/security)
File Snapshot

[4.0K] /data/pocs/7a1c11058e0ebf8ae22cf716058f597860b00b5e ├── [1.9K] heroku-CVE-2013-0269.rb ├── [ 535] heroku-CVE-2013-0269.rb.asc └── [1.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.