Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-BCAB06E35B4C177D48A9C9F54B8EA9BB
HistoryOct 24, 2017 - 12:00 a.m.

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

2017-10-2400:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
28

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.133 Low

EPSS

Percentile

95.6%

The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.

Affected configurations

Vulners
Node
gemactiverecordRange<3.0.14
OR
gemactiverecordRange3.1.0β‰₯
OR
gemactiverecordRange<3.1.6
OR
gemactiverecordRange3.2.0β‰₯
OR
gemactiverecordRange<3.2.6

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.133 Low

EPSS

Percentile

95.6%