Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-6417

Опубликовано: 07 дек. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.4

Описание

actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.

РелизСтатусПримечание
artful

not-affected

contains no code
bionic

not-affected

contains no code
devel

not-affected

contains no code
esm-apps/bionic

not-affected

contains no code
esm-apps/xenial

not-affected

contains no code
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [contains no code]]
lucid

ignored

end of life
precise

not-affected

contains no code
precise/esm

DNE

precise was not-affected [contains no code]
quantal

not-affected

contains no code

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.2.16-3]]
lucid

DNE

precise

DNE

precise/esm

DNE

quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

precise/esm

DNE

precise was not-affected
quantal

not-affected

raring

not-affected

saucy

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
lucid

DNE

precise

DNE

precise/esm

DNE

quantal

not-affected

raring

not-affected

saucy

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

precise/esm

DNE

precise was not-affected
quantal

not-affected

raring

not-affected

saucy

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
lucid

DNE

precise

DNE

precise/esm

DNE

quantal

not-affected

raring

not-affected

saucy

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
lucid

DNE

precise

DNE

precise/esm

DNE

quantal

not-affected

raring

not-affected

saucy

not-affected

Показывать по

EPSS

Процентиль: 66%
0.00512
Низкий

6.4 Medium

CVSS2

Связанные уязвимости

redhat
около 12 лет назад

actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.

nvd
около 12 лет назад

actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.

debian
около 12 лет назад

actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before ...

github
больше 8 лет назад

actionpack allows bypass of database-query restrictions

EPSS

Процентиль: 66%
0.00512
Низкий

6.4 Medium

CVSS2

Уязвимость CVE-2013-6417