Sha256: 5413289e71735ac477e9fa0d482a45ef41a5d5daabc334693563d00157f942b7

Contents?: true

Size: 587 Bytes

Versions: 1

Compression:

Stored size: 587 Bytes

Contents

---
url: http://www.osvdb.org/show/osvdb/82403
title: Ruby on Rails where Method ActiveRecord Class SQL Injection 

description: > 
  Ruby on Rails (RoR) contains a flaw that may allow an attacker to
  carry out an SQL injection attack. The issue is due to the
  ActiveRecord class not properly sanitizing user-supplied input to
  the 'where' method. This may allow an attacker to inject or
  manipulate SQL queries in an application built on RoR, allowing for
  the manipulation or disclosure of arbitrary data.

cvss_v2: 5.0

patched_versions:
  - ~> 3.0.13
  - ~> 3.1.5
  - ">= 3.2.4"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.1.1 data/bundler/audit/rails/2012-2661.yml