CVE-2012-6497

The Authlogic gem for Ruby on Rails, when used with certain versions before 3.2.10, makes potentially unsafe find_by_id method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in secret_token.rb in an open-source product.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:46

Type Values Removed Values Added
References () http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/ - Exploit () http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/ - Exploit
References () http://openwall.com/lists/oss-security/2013/01/03/12 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2013/01/03/12 - Mailing List, Third Party Advisory
References () http://phenoelit.org/blog/archives/2012/12/21/let_me_github_that_for_you/index.html - Broken Link, Exploit () http://phenoelit.org/blog/archives/2012/12/21/let_me_github_that_for_you/index.html - Broken Link, Exploit
References () http://www.securityfocus.com/bid/57084 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/57084 - Broken Link, Third Party Advisory, VDB Entry

Information

Published : 2013-01-04 04:46

Updated : 2024-11-21 01:46


NVD link : CVE-2012-6497

Mitre link : CVE-2012-6497

CVE.ORG link : CVE-2012-6497


JSON object : View

Products Affected

rubyonrails

  • rails
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')