Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-6317

Опубликовано: 11 авг. 2016
Источник: redhat
CVSS3: 5.3
CVSS2: 4.3
EPSS Низкий

Описание

Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.

A flaw was found in the way Active Record handled certain special values in dynamic finders and relations. If a Ruby on Rails application performed JSON parameter parsing, a remote attacker could possibly manipulate search conditions in SQL queries generated by the application.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenStack Foremanruby193-rubygem-activerecordNot affected
Red Hat Software Collectionsrh-ror41-rubygem-activerecordNot affected
Red Hat Software Collectionsror40-rubygem-activerecordNot affected
Red Hat Software Collectionsruby193-rubygem-activerecordNot affected
Red Hat Subscription Asset Managerruby193-rubygem-activerecordNot affected
Red Hat Subscription Asset Managerrubygem-activerecordNot affected
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-ror42-rubygem-actionpackFixedRHSA-2016:185513.09.2016
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-ror42-rubygem-actionviewFixedRHSA-2016:185513.09.2016
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-ror42-rubygem-activerecordFixedRHSA-2016:185513.09.2016
Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUSrh-ror42-rubygem-actionpackFixedRHSA-2016:185513.09.2016

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1365017rubygem-activerecord: unsafe query generation in Active Record

EPSS

Процентиль: 59%
0.00381
Низкий

5.3 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 9 лет назад

Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.

CVSS3: 7.5
nvd
больше 9 лет назад

Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.

CVSS3: 7.5
debian
больше 9 лет назад

Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly ...

CVSS3: 7.5
github
больше 8 лет назад

ActiveRecord in Ruby on Rails allows database-query bypass

EPSS

Процентиль: 59%
0.00381
Низкий

5.3 Medium

CVSS3

4.3 Medium

CVSS2