Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-0155

Опубликовано: 13 янв. 2013
Источник: ubuntu
Приоритет: high
EPSS Средний
CVSS2: 6.4

Описание

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.

РелизСтатусПримечание
devel

not-affected

contains no code
hardy

ignored

end of life
lucid

ignored

end of life
oneiric

not-affected

contains no code
precise

not-affected

contains no code
quantal

not-affected

contains no code
raring

not-affected

contains no code
saucy

not-affected

contains no code
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

DNE

oneiric

not-affected

precise

not-affected

quantal

not-affected

raring

not-affected

saucy

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

3.2.6-5
hardy

DNE

lucid

DNE

oneiric

DNE

precise

DNE

quantal

released

3.2.6-4ubuntu0.1
raring

not-affected

3.2.6-5
saucy

not-affected

3.2.6-5
upstream

released

3.2.6-5

Показывать по

РелизСтатусПримечание
devel

released

2.3.14-4
hardy

DNE

lucid

DNE

oneiric

released

2.3.14-1ubuntu0.11.10.1
precise

released

2.3.14-1ubuntu0.12.04.1
quantal

released

2.3.14-2ubuntu0.1
raring

released

2.3.14-4
saucy

released

2.3.14-4
upstream

released

2.3.14-4

Показывать по

РелизСтатусПримечание
devel

not-affected

3.2.6-4
hardy

DNE

lucid

DNE

oneiric

DNE

precise

DNE

quantal

released

3.2.6-2ubuntu0.1
raring

not-affected

3.2.6-4
saucy

not-affected

3.2.6-4
upstream

released

3.2.6-4

Показывать по

EPSS

Процентиль: 95%
0.18174
Средний

6.4 Medium

CVSS2

Связанные уязвимости

redhat
около 13 лет назад

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.

nvd
около 13 лет назад

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.

debian
около 13 лет назад

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x befo ...

github
больше 8 лет назад

Active Record allows bypassing of database-query restrictions

EPSS

Процентиль: 95%
0.18174
Средний

6.4 Medium

CVSS2