Lucene search

K
nvd[email protected]NVD:CVE-2016-6317
HistorySep 07, 2016 - 7:28 p.m.

CVE-2016-6317

2016-09-0719:28:11
CWE-476
CWE-284
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.5 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.8%

Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain “[nil]” values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.

Affected configurations

NVD
Node
rubyonrailsrailsMatch4.2.0
OR
rubyonrailsrailsMatch4.2.0beta1
OR
rubyonrailsrailsMatch4.2.0beta2
OR
rubyonrailsrailsMatch4.2.0beta3
OR
rubyonrailsrailsMatch4.2.0beta4
OR
rubyonrailsrailsMatch4.2.0rc1
OR
rubyonrailsrailsMatch4.2.0rc2
OR
rubyonrailsrailsMatch4.2.0rc3
OR
rubyonrailsrailsMatch4.2.1
OR
rubyonrailsrailsMatch4.2.1rc1
OR
rubyonrailsrailsMatch4.2.1rc2
OR
rubyonrailsrailsMatch4.2.1rc3
OR
rubyonrailsrailsMatch4.2.1rc4
OR
rubyonrailsrailsMatch4.2.2
OR
rubyonrailsrailsMatch4.2.3
OR
rubyonrailsrailsMatch4.2.3rc1
OR
rubyonrailsrailsMatch4.2.4
OR
rubyonrailsrailsMatch4.2.4rc1
OR
rubyonrailsrailsMatch4.2.5
OR
rubyonrailsrailsMatch4.2.5rc1
OR
rubyonrailsrailsMatch4.2.5rc2
OR
rubyonrailsrailsMatch4.2.5.1
OR
rubyonrailsrailsMatch4.2.5.2
OR
rubyonrailsrailsMatch4.2.6
OR
rubyonrailsrailsMatch4.2.6rc1
OR
rubyonrailsrailsMatch4.2.7
OR
rubyonrailsrailsMatch4.2.7rc1

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.5 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.8%