A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 related to the sanitization of comments. If malicious user input is passed to either the `annotate` query method, the `optimizer_hints` query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database withinsufficient sanitization and be able to inject SQL outside of the comment.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117 - Exploit, Patch, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240202-0008/ - | |
References | () https://www.debian.org/security/2023/dsa-5372 - |
02 Feb 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-02-09 20:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22794
Mitre link : CVE-2023-22794
CVE.ORG link : CVE-2023-22794
JSON object : View
Products Affected
activerecord_project
- activerecord
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')