CVE-2013-0155
rubygem-activerecord: Unsafe Query Generation Risk in Ruby on Rails
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.
Ruby on Rails v3.0.x anteior a v3.0.19, v3.1.x anteior a v3.1.10, y v3.2.x anteior a v3.2.11 no considera adecuadamente las diferencias en el manejo de parámetros entre el componente Active Record y la implementación JSON, lo que permite a atacantes remotos evitar las restricciones de peticiones a base de datos y realizar chequeos NULL o provocar un WHERE a través de una consulta manipulada. Como se ha demostrado mdiante determinados valires "[nil]". Relacionado con los CVE-2012-2660 y CVE-2012-2694.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-12-06 CVE Reserved
- 2013-01-11 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A | Third Party Advisory | |
http://support.apple.com/kb/HT5784 | Third Party Advisory | |
https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source&output=gplain | Mailing List | |
https://puppet.com/security/cve/cve-2013-0155 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rubyonrails Search vendor "Rubyonrails" | Rails Search vendor "Rubyonrails" for product "Rails" | >= 3.2.0 < 3.2.11 Search vendor "Rubyonrails" for product "Rails" and version " >= 3.2.0 < 3.2.11" | - |
Affected
| ||||||
Rubyonrails Search vendor "Rubyonrails" | Ruby On Rails Search vendor "Rubyonrails" for product "Ruby On Rails" | >= 3.0.0 < 3.0.19 Search vendor "Rubyonrails" for product "Ruby On Rails" and version " >= 3.0.0 < 3.0.19" | - |
Affected
| ||||||
Rubyonrails Search vendor "Rubyonrails" | Ruby On Rails Search vendor "Rubyonrails" for product "Ruby On Rails" | >= 3.1.0 < 3.1.10 Search vendor "Rubyonrails" for product "Ruby On Rails" and version " >= 3.1.0 < 3.1.10" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 6.0 Search vendor "Debian" for product "Debian Linux" and version "6.0" | - |
Affected
|