Lucene search

K
githubGitHub Advisory DatabaseGHSA-9RF5-JM6F-2FMM
HistoryOct 24, 2017 - 6:33 p.m.

Active Record subject to strong parameters protection bypass

2017-10-2418:33:36
CWE-284
GitHub Advisory Database
github.com
9

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.9%

activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls.

Affected configurations

Vulners
Node
activerecord_projectactiverecordRange<4.1.5ruby
OR
activerecord_projectactiverecordRange<4.0.9ruby
CPENameOperatorVersion
activerecordlt4.1.5
activerecordlt4.0.9

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.9%