CVE-2022-44566 – rubygem-activerecord: Denial of Service
https://notcve.org/view.php?id=CVE-2022-44566
A denial of service vulnerability present in ActiveRecord's PostgreSQL adapter <7.0.4.1 and <6.1.7.1. When a value outside the range for a 64bit signed integer is provided to the PostgreSQL connection adapter, it will treat the target column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan resulting in potential Denial of Service. A flaw was found in the rubygem-activerecord. RubyGem's ActiveRecord is vulnerable to a denial of service caused by a flaw in the PostgreSQL adapter. • https://code.jeremyevans.net/2022-11-01-forcing-sequential-scans-on-postgresql.html https://discuss.rubyonrails.org/t/cve-2022-44566-possible-denial-of-service-vulnerability-in-activerecords-postgresql-adapter/82119 https://access.redhat.com/security/cve/CVE-2022-44566 https://bugzilla.redhat.com/show_bug.cgi?id=2164789 • CWE-400: Uncontrolled Resource Consumption •
CVE-2022-32224 – activerecord: Possible RCE escalation bug with Serialized Columns in Active Record
https://notcve.org/view.php?id=CVE-2022-32224
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE. Existe una posible escalada a la vulnerabilidad RCE cuando se utilizan columnas serializadas YAML en Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 y <5.2.8.1, lo que podría permitir a un atacante, que puede manipular datos en la base de datos (a través de medios como la inyección SQL), la capacidad de escalar a un RCE. An insecure deserialization flaw was found in Active Record, which uses YAML.unsafe_load to convert the YAML data into Ruby objects. An attacker supplying crafted data to the database can perform remote code execution (RCE), resulting in complete system compromise. • https://github.com/advisories/GHSA-3hhc-qp5v-9p2j https://groups.google.com/g/rubyonrails-security/c/MmFO3LYQE8U https://access.redhat.com/security/cve/CVE-2022-32224 https://bugzilla.redhat.com/show_bug.cgi?id=2108997 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-502: Deserialization of Untrusted Data •