Sha256: 72636572c0adb69007a0f6062f6d75ee8dd49867332230e078117024063675f4

Contents?: true

Size: 711 Bytes

Versions: 1

Compression:

Stored size: 711 Bytes

Contents

--- 
gem: activerecord
framework: rails
cve: 2012-2661
osvdb: 82403
url: https://nvd.nist.gov/vuln/detail/CVE-2012-2661
title: Ruby on Rails where Method ActiveRecord Class SQL Injection
date: 2012-05-31

description: |
  Ruby on Rails (RoR) contains a flaw that may allow an attacker to carry out
  an SQL injection attack. The issue is due to the ActiveRecord class not
  properly sanitizing user-supplied input to the 'where' method. This may
  allow an attacker to inject or manipulate SQL queries in an application
  built on RoR, allowing for the manipulation or disclosure of arbitrary data.

cvss_v2: 5.0

unaffected_versions:
  - ~> 2.3.14

patched_versions: 
  - ~> 3.0.13
  - ~> 3.1.5
  - ">= 3.2.4"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/activerecord/CVE-2012-2661.yml