Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-1855.html - | |
References | () http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/ - Release Notes | |
References | () http://www.openwall.com/lists/oss-security/2016/08/11/4 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/92434 - | |
References | () https://groups.google.com/forum/#%21topic/ruby-security-ann/WccgKSKiPZA - |
07 Nov 2023, 02:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2016-09-07 19:28
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6317
Mitre link : CVE-2016-6317
CVE.ORG link : CVE-2016-6317
JSON object : View
Products Affected
rubyonrails
- rails