Lucene search

K
githubGitHub Advisory DatabaseGHSA-GPPP-5XC5-WFPX
HistoryOct 24, 2017 - 6:33 p.m.

Active Record allows bypassing of database-query restrictions

2017-10-2418:33:37
CWE-284
GitHub Advisory Database
github.com
30

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.8%

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain “[nil]” values, a related issue to CVE-2012-2660 and CVE-2012-2694.

Affected configurations

Vulners
Node
activerecord_projectactiverecordRange<3.2.11ruby
OR
activerecord_projectactiverecordRange<3.1.10ruby
OR
activerecord_projectactiverecordRange<3.0.19ruby

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.8%