Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. actionmailer
  4. ›
  5. CVE-2013-4389

CVE-2013-4389: Possible DoS Vulnerability

October 16, 2013 (updated August 8, 2019)

A carefully crafted email address in conjunction with the Action Mailer logger format string could take advantage of a bug in Ruby’s sprintf implementation and possibly lead to a denial of service attack. Impacted Ruby code will look something like this: "some string #{user_input}" % some_number

References

  • seclists.org/oss-sec/2013/q4/118

Code Behaviors & Features

Detect and mitigate CVE-2013-4389 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0.0 before 3.2.15

Fixed versions

  • 3.2.15

Solution

Upgrade to 3.2.15. If you aren't able to upgrade immediately, please check the source link to apply patches.

Impact 4.3 MEDIUM

AV:N/AC:M/Au:N/C:N/I:N/A:P

Learn more about CVSS

Weakness

  • CWE-134: Use of Externally-Controlled Format String

Source file

gem/actionmailer/CVE-2013-4389.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:58 +0000.