Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-3CE9A140378A064CBEF6D0D382474BF9
HistoryJan 13, 2013 - 12:00 a.m.

Unsafe Query Generation Risk in Ruby on Rails

2013-01-1300:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
23

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.8%

Due to the way Active Record interprets parameters in combination with the way that JSON parameters are parsed, it is possible for an attacker to issue unexpected database queries with “IS NULL” or empty where clauses. This issue does not let an attacker insert arbitrary values into an SQL query, however they can cause the query to check for NULL or eliminate a WHERE clause when most users wouldn’t expect it.

Affected configurations

Vulners
Node
gemactiverecordRange<3.0.19
OR
gemactiverecordRange3.1.0
OR
gemactiverecordRange<3.1.10
OR
gemactiverecordRange3.2.0
OR
gemactiverecordRange<3.2.11

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

72.8%