Lucene search

K
githubGitHub Advisory DatabaseGHSA-WPW7-WXJM-CW8R
HistoryOct 24, 2017 - 6:33 p.m.

actionpack allows bypass of database-query restrictions

2017-10-2418:33:36
CWE-284
GitHub Advisory Database
github.com
25

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.007 Low

EPSS

Percentile

80.9%

actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.

Affected configurations

Vulners
Node
actionpack_projectactionpackRange<4.0.2ruby
OR
actionpack_projectactionpackRange<3.2.16ruby
CPENameOperatorVersion
actionpacklt4.0.2
actionpacklt3.2.16

References

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.007 Low

EPSS

Percentile

80.9%