<s>
Mass	B-Protocol
assignment	I-Protocol
is	O
a	O
computer	O
vulnerability	O
where	O
an	O
active	O
record	O
pattern	O
in	O
a	O
web	B-Application
application	I-Application
is	O
abused	O
to	O
modify	O
data	O
items	O
that	O
the	O
user	O
should	O
not	O
normally	O
be	O
allowed	O
to	O
access	O
such	O
as	O
password	O
,	O
granted	O
permissions	O
,	O
or	O
administrator	O
status	O
.	O
</s>
<s>
Many	O
web	B-Application
application	I-Application
frameworks	I-Application
offer	O
an	O
active	O
record	O
and	O
object-relational	B-General_Concept
mapping	I-General_Concept
features	O
,	O
where	O
external	O
data	O
in	O
serialization	B-Application
formats	O
is	O
automatically	O
converted	O
on	O
input	O
into	O
internal	O
objects	O
and	O
,	O
in	O
turn	O
,	O
into	O
database	O
record	O
fields	O
.	O
</s>
<s>
These	O
vulnerabilities	O
have	O
been	O
found	O
in	O
applications	O
written	O
in	O
Ruby	B-Application
on	I-Application
Rails	I-Application
,	O
ASP.NET	B-Language
MVC	I-Language
,	O
and	O
Java	B-Device
Play	B-Language
framework	I-Language
.	O
</s>
<s>
In	O
2012	O
mass	B-Protocol
assignment	I-Protocol
on	O
Ruby	B-Application
on	I-Application
Rails	I-Application
allowed	O
bypassing	O
of	O
mapping	O
restrictions	O
and	O
resulted	O
in	O
proof	O
of	O
concept	O
injection	O
of	O
unauthorized	O
SSH	B-Protocol
public	O
keys	O
into	O
user	O
accounts	O
at	O
GitHub	B-Application
.	O
</s>
<s>
Further	O
vulnerabilities	O
in	O
Ruby	B-Application
on	I-Application
Rails	I-Application
allowed	O
creation	O
of	O
internal	O
objects	O
through	O
a	O
specially	O
crafted	O
JSON	B-General_Concept
structure	O
.	O
</s>
