Lucene search

K
githubGitHub Advisory DatabaseGHSA-M8H6-M9P5-P2F8
HistoryAug 13, 2018 - 8:49 p.m.

Moderate severity vulnerability that affects activerecord

2018-08-1320:49:01
GitHub Advisory Database
github.com
31

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.8%

Withdrawn, accidental duplicate publish.

Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain “[nil]” values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.

Affected configurations

Vulners
Node
activerecord_projectactiverecordRange4.2.7.0ruby
CPENameOperatorVersion
activerecordle4.2.7.0

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.8%