First published: Mon Feb 21 2011(Updated: )
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/activerecord | >=3.0.0<3.0.4 | 3.0.4 |
Ruby on Rails | =3.0.0 | |
Ruby on Rails | =3.0.0-beta | |
Ruby on Rails | =3.0.0-beta2 | |
Ruby on Rails | =3.0.0-beta3 | |
Ruby on Rails | =3.0.0-beta4 | |
Ruby on Rails | =3.0.0-rc | |
Ruby on Rails | =3.0.0-rc2 | |
Ruby on Rails | =3.0.1 | |
Ruby on Rails | =3.0.1-pre | |
Ruby on Rails | =3.0.2 | |
Ruby on Rails | =3.0.2-pre | |
Ruby on Rails | =3.0.3 | |
Ruby on Rails | =3.0.4-rc1 |
http://groups.google.com/group/rubyonrails-security/msg/4e19864cf6ad40ad?dmode=source&output=gplain
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0448 is considered a high severity vulnerability due to its potential to enable SQL injection attacks.
Updating to Ruby on Rails version 3.0.4 or higher resolves the issue related to CVE-2011-0448.
CVE-2011-0448 affects Ruby on Rails versions 3.0.0 through 3.0.3.
CVE-2011-0448 is categorized as an SQL injection vulnerability.
Remote attackers can exploit CVE-2011-0448 by passing non-numeric arguments to the limit function.