Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-17916

Опубликовано: 29 дек. 2017
Источник: debian
EPSS Низкий

Описание

SQL injection vulnerability in the 'find_by' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input

Пакеты

ПакетСтатусВерсия исправленияРелизТип
railsunfixedpackage

Примечания

  • https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/

  • All of those methods accept arbitrary SQL by design.

EPSS

Процентиль: 68%
0.00586
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 8 лет назад

SQL injection vulnerability in the 'find_by' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input

CVSS3: 8.1
nvd
около 8 лет назад

SQL injection vulnerability in the 'find_by' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input

CVSS3: 8.1
github
больше 3 лет назад

** DISPUTED ** SQL injection vulnerability in the 'find_by' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.

EPSS

Процентиль: 68%
0.00586
Низкий