Sha256: 49564dcc5a691ce58ad019f92ff81a6ac10ecb95d7cbd9ef55c6a04e499acd86
Contents?: true
Size: 850 Bytes
Versions: 1
Compression:
Stored size: 850 Bytes
Contents
--- gem: administrate cve: 2020-5257 ghsa: 2p5p-m353-833w title: Sort order SQL injection via `direction` parameter in administrate date: 2020-03-14 url: https://github.com/advisories/GHSA-2p5p-m353-833w description: | In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the direction parameter and bypass ActiveRecord SQL protections. Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which should generally be behind authentication. patched_versions: - ">= 0.13.0" related: url: - https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/administrate/CVE-2020-5257.yml |