Lucene search

K
githubGitHub Advisory DatabaseGHSA-76WQ-XW4H-F8WJ
HistoryOct 24, 2017 - 6:33 p.m.

activerecord vulnerable to SQL Injection

2017-10-2418:33:38
CWE-89
GitHub Advisory Database
github.com
29

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.133 Low

EPSS

Percentile

95.6%

The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.

Affected configurations

Vulners
Node
activerecord_projectactiverecordRange<3.2.6ruby
OR
activerecord_projectactiverecordRange<3.1.6ruby
OR
activerecord_projectactiverecordRange<3.0.14ruby

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.133 Low

EPSS

Percentile

95.6%