CVE-2023-22794

A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 related to the sanitization of comments. If malicious user input is passed to either the `annotate` query method, the `optimizer_hints` query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database withinsufficient sanitization and be able to inject SQL outside of the comment.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:activerecord_project:activerecord:*:*:*:*:*:ruby:*:*
cpe:2.3:a:activerecord_project:activerecord:*:*:*:*:*:ruby:*:*
cpe:2.3:a:activerecord_project:activerecord:*:*:*:*:*:ruby:*:*

History

21 Nov 2024, 07:45

Type Values Removed Values Added
References () https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117 - Exploit, Patch, Vendor Advisory () https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117 - Exploit, Patch, Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20240202-0008/ - () https://security.netapp.com/advisory/ntap-20240202-0008/ -
References () https://www.debian.org/security/2023/dsa-5372 - () https://www.debian.org/security/2023/dsa-5372 -

02 Feb 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240202-0008/ -

Information

Published : 2023-02-09 20:15

Updated : 2024-11-21 07:45


NVD link : CVE-2023-22794

Mitre link : CVE-2023-22794

CVE.ORG link : CVE-2023-22794


JSON object : View

Products Affected

activerecord_project

  • activerecord
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')