Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pr3r-4wrp-r2pv

Опубликовано: 24 окт. 2017
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

ActiveRecord in Ruby on Rails allows database-query bypass

Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.

Пакеты

Наименование

activerecord

rubygems
Затронутые версииВерсия исправления

>= 4.2.0, <= 4.2.7.0

4.2.7.1

EPSS

Процентиль: 59%
0.00381
Низкий

7.5 High

CVSS3

Дефекты

CWE-284
CWE-476

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 9 лет назад

Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.

CVSS3: 5.3
redhat
больше 9 лет назад

Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.

CVSS3: 7.5
nvd
больше 9 лет назад

Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.

CVSS3: 7.5
debian
больше 9 лет назад

Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly ...

EPSS

Процентиль: 59%
0.00381
Низкий

7.5 High

CVSS3

Дефекты

CWE-284
CWE-476