The Authlogic gem for Ruby on Rails, when used with certain versions before 3.2.10, makes potentially unsafe find_by_id method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in secret_token.rb in an open-source product.
References
Link | Resource |
---|---|
http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/ | Exploit |
http://openwall.com/lists/oss-security/2013/01/03/12 | Mailing List Third Party Advisory |
http://phenoelit.org/blog/archives/2012/12/21/let_me_github_that_for_you/index.html | Broken Link Exploit |
http://www.securityfocus.com/bid/57084 | Broken Link Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2013-01-04 04:46
Updated : 2024-02-28 12:00
NVD link : CVE-2012-6497
Mitre link : CVE-2012-6497
CVE.ORG link : CVE-2012-6497
JSON object : View
Products Affected
rubyonrails
- rails
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')