Sha256: b0327a71dc5a07f3a4325df637d1ed3a2fc72ffe66748922da26b1b4eb340d3f

Contents?: true

Size: 637 Bytes

Versions: 2

Compression:

Stored size: 637 Bytes

Contents

---
url: http://osvdb.org/show/osvdb/89025
title: |
  Ruby on Rails Active Record JSON Parameter Parsing Query Bypass 

description: |
  Ruby on Rails contains a flaw in the Active Record. The issue is due to an
  error with the way the Active Record handles parameters combined with an
  error during the parsing of the JSON parameters. This may allow a remote
  attacker to bypass restrictions abd issue unexpected database queries with
  "IS NULL" or empty where clauses, and forcing the query to unexpectedly check
  for NULL or eliminate a WHERE clause.

cvss_v2: 10.0

patched_versions:
  - ~> 3.0.19
  - ~> 3.1.10
  - ">= 3.2.11"

Version data entries

2 entries across 2 versions & 1 rubygems

Version Path
bundler-audit-0.1.1 data/bundler/audit/rails/2013-0155.yml
bundler-audit-0.1.0 data/bundler/audit/rails/2013-0155.yml