2 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the "example app" provided by the project are at highest risk. Ruby OpenID (conocido como ruby-openid) a través de la versión 2.8.0 tiene un defecto aprovechable remotamente. • https://github.com/openid/ruby-openid/issues/122 https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html https://marc.info/?l=openid-security&m=155154717027534&w=2 https://security.gentoo.org/glsa/202003-09 •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 1

The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack. El gem de ruby-openid anterior a la versión 2.2.2 para Ruby permite a proveedores de OpenID remotos provocar una denegación de servicio (consumo de CPU) a través de (1) un documento XRDS grande o (2) un ataque de XML Entity Expansion (XEE). • http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120204.html http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120361.html http://www.openwall.com/lists/oss-security/2013/03/03/8 https://bugzilla.redhat.com/show_bug.cgi?id=918134 https://github.com/openid/ruby-openid/blob/master/CHANGELOG.md https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed https://github.com/openid/ruby-openid/pull/43 • CWE-399: Resource Management Errors •