[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-2695Date: (C)2012-06-22   (M)2024-02-22


The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
RHSA-2013:0154
SUSE-SU-2012:1012
SUSE-SU-2012:1014
https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source&output=gplain
openSUSE-SU-2012:0978
openSUSE-SU-2012:1066

CPE    2
cpe:/a:rubyonrails:ruby_on_rails:3.0.4
cpe:/a:rubyonrails:ruby_on_rails
CWE    1
CWE-89
OVAL    12
oval:org.secpod.oval:def:400359
oval:org.secpod.oval:def:104436
oval:org.secpod.oval:def:104430
oval:org.secpod.oval:def:104651
...

© SecPod Technologies