Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0155

Опубликовано: 08 янв. 2013
Источник: redhat
CVSS2: 6.4
EPSS Средний

Описание

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat CloudForms Tools 1rubygem-actionpackAffected
CloudForms for RHEL 6rubygem-actionpackFixedRHSA-2013:015510.01.2013
CloudForms for RHEL 6rubygem-activerecordFixedRHSA-2013:015510.01.2013
CloudForms for RHEL 6rubygem-activesupportFixedRHSA-2013:015510.01.2013
Red Hat Subscription Asset Manager 1.1rubygem-actionpackFixedRHSA-2013:015410.01.2013
Red Hat Subscription Asset Manager 1.1rubygem-activerecordFixedRHSA-2013:015410.01.2013
Red Hat Subscription Asset Manager 1.1rubygem-activesupportFixedRHSA-2013:015410.01.2013
RHEL 6 Version of OpenShift EnterprisegraphvizFixedRHSA-2013:058228.02.2013
RHEL 6 Version of OpenShift Enterpriseopenshift-consoleFixedRHSA-2013:058228.02.2013
RHEL 6 Version of OpenShift Enterpriseopenshift-origin-brokerFixedRHSA-2013:058228.02.2013

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-89
https://bugzilla.redhat.com/show_bug.cgi?id=892866rubygem-activerecord: Unsafe Query Generation Risk in Ruby on Rails

EPSS

Процентиль: 95%
0.18174
Средний

6.4 Medium

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.

nvd
около 13 лет назад

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.

debian
около 13 лет назад

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x befo ...

github
больше 8 лет назад

Active Record allows bypassing of database-query restrictions

EPSS

Процентиль: 95%
0.18174
Средний

6.4 Medium

CVSS2