[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-4094

Date: (C)2008-09-30   (M)2017-08-08
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.

Reference:
SECTRACK-1020871
BID-31176
SECUNIA-31875
SECUNIA-31909
SECUNIA-31910
ADV-2008-2562
SUSE-SR:2008:027
http://www.openwall.com/lists/oss-security/2008/09/13/2
http://www.openwall.com/lists/oss-security/2008/09/16/1
http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1
http://gist.github.com/8946
http://rails.lighthouseapp.com/projects/8994/tickets/288
http://rails.lighthouseapp.com/projects/8994/tickets/964
http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/
rubyonrails-activerecord-sql-injection(45109)

CPE    51
cpe:/a:rubyonrails:ruby_on_rails:0.9.0
cpe:/a:rubyonrails:ruby_on_rails:0.9.1
cpe:/a:rubyonrails:ruby_on_rails:0.5.5
cpe:/a:rubyonrails:ruby_on_rails:0.9.2
...
CWE    1
CWE-89
OVAL    1
oval:org.secpod.oval:def:102014

© 2013 SecPod Technologies