First published: Mon Feb 21 2011(Updated: )
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | =3.0.0-beta | |
Rubyonrails Rails | =3.0.0-beta2 | |
Rubyonrails Rails | =3.0.0-beta3 | |
Rubyonrails Rails | =3.0.0-beta4 | |
Rubyonrails Rails | =3.0.0-rc | |
Rubyonrails Rails | =3.0.0-rc2 | |
Rubyonrails Rails | =3.0.1-pre | |
Rubyonrails Rails | =3.0.2-pre | |
Rubyonrails Rails | =3.0.0 | |
Rubyonrails Rails | =3.0.1 | |
Rubyonrails Rails | =3.0.2 | |
Rubyonrails Rails | =3.0.3 | |
Rubyonrails Rails | =3.0.4-rc1 | |
rubygems/activerecord | >=3.0.0<3.0.4 | 3.0.4 |
http://groups.google.com/group/rubyonrails-security/msg/4e19864cf6ad40ad?dmode=source&output=gplain
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.