Skip to content

Commit 08e69ef

Browse files
committed
Apply @alanwu's suggestion
1 parent 7104da0 commit 08e69ef

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

en/news/_posts/2020-03-19-json-dos-cve-2020-10663.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ There is an unsafe object creation vulnerability in the json gem bundled with Ru
1010

1111
## Details
1212

13-
When parsing certain JSON documents, the JSON gem (including bundled versions with the Ruby packages) can be coerced in to creating arbitrary object in a target system.
13+
When parsing certain JSON documents, the json gem (including the one bundled with Ruby) can be coerced into creating arbitrary objects in the target system.
1414

1515
This is the same issue as [CVE-2013-0269](https://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/). The previous fix was incomplete, which addressed `JSON.parse(user_input)`, but didn't address some other styles of JSON parsing including `JSON(user_input)` and `JSON.parse(user_input, nil)`.
1616

0 commit comments

Comments
 (0)