{"uuid": "2d045eba-9910-4e8a-a303-12ff0e230613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-14033", "type": "published-proof-of-concept", "source": "https://t.me/evilmartians/220", "content": "\u041e\u0431\u0440\u0430\u0442\u0438\u0442\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043d\u0430 \u043a\u0443\u0447\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (\u043d\u0435 \u043e\u0447\u0435\u043d\u044c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445) \u0432 Ruby. \u0421\u043a\u043e\u0440\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f.\n\nUPD: \u0412\u044b\u0448\u0435\u043b 2.4.2, \u043d\u0430 Heroku \u0442\u043e\u0436\u0435 \u0435\u0433\u043e \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0438. \u041d\u0435 \u0437\u0430\u0431\u0443\u0434\u044c\u0442\u0435 \u043f\u0440\u043e\u0439\u0442\u0438\u0441\u044c \u043f\u043e \u0441\u0432\u043e\u0438\u043c \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u043c\n\nhttps://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/\nhttps://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/\nhttps://www.ruby-lang.org/en/news/2017/09/14/openssl-asn1-buffer-underrun-cve-2017-14033/\nhttps://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/", "creation_timestamp": "2017-09-17T16:13:56.000000Z"}