[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-2661Date: (C)2012-06-22   (M)2024-02-22


The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
RHSA-2013:0154
SUSE-SU-2012:1012
SUSE-SU-2012:1014
https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source&output=gplain
openSUSE-SU-2012:1066

CPE    1
cpe:/a:rubyonrails:ruby_on_rails:3.0.4
CWE    1
CWE-89
OVAL    12
oval:org.secpod.oval:def:104436
oval:org.secpod.oval:def:104430
oval:org.secpod.oval:def:104651
oval:org.secpod.oval:def:103958
...

© SecPod Technologies