Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-17919

Опубликовано: 29 дек. 2017
Источник: debian
EPSS Низкий

Описание

SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input

Пакеты

ПакетСтатусВерсия исправленияРелизТип
railsunfixedpackage

Примечания

  • https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/

  • All of those methods accept arbitrary SQL by design.

EPSS

Процентиль: 68%
0.00582
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 8 лет назад

SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input

CVSS3: 8.1
nvd
около 8 лет назад

SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input

CVSS3: 8.1
github
больше 3 лет назад

** DISPUTED ** SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.

EPSS

Процентиль: 68%
0.00582
Низкий