Loading
Generated remediation guidance and an executive summary. No account required.
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
Use Rubyonrails vendor hub and Rails product page to widen CVE-2013-0333 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-33195, CVE-2024-26142 and CVE-2026-33169 for nearby disclosures in the same product family.