Sha256: 448f269170b8662befc261c2d99eae1eaa4df69da0f49d47d95fb62261756c9a
Contents?: true
Size: 742 Bytes
Versions: 1
Compression:
Stored size: 742 Bytes
Contents
--- gem: activerecord framework: rails cve: 2013-0155 osvdb: 89025 url: https://nvd.nist.gov/vuln/detail/CVE-2013-0155 title: Ruby on Rails Active Record JSON Parameter Parsing Query Bypass date: 2013-01-08 description: | Ruby on Rails contains a flaw in the Active Record. The issue is due to an error with the way the Active Record handles parameters combined with an error during the parsing of the JSON parameters. This may allow a remote attacker to bypass restrictions abd issue unexpected database queries with "IS NULL" or empty where clauses, and forcing the query to unexpectedly check for NULL or eliminate a WHERE clause. cvss_v2: 10.0 patched_versions: - ~> 2.3.16 - ~> 3.0.19 - ~> 3.1.10 - ">= 3.2.11"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/activerecord/CVE-2013-0155.yml |