First published: Wed Aug 17 2011(Updated: )
An SQL injection vulnerability in the quote_table_name method could allow malicious users to inject arbitrary SQL into a query [1]. This is corrected in upstream 3.0.10, 2.3.13, and 3.1.0rc5 versions. Patches are available in the advisory [1] and in git [2]. [1] <a href="http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6a1e473744bc389b">http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6a1e473744bc389b</a> [2] <a href="https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85">https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Ruby On Rails | =3.0.4 | |
Rubyonrails Rails | =2.0.1 | |
Rubyonrails Rails | =2.0.2 | |
Rubyonrails Rails | =2.0.4 | |
Rubyonrails Rails | =2.1.0 | |
Rubyonrails Rails | =2.1.1 | |
Rubyonrails Rails | =2.1.2 | |
Rubyonrails Rails | =2.2.0 | |
Rubyonrails Rails | =2.2.1 | |
Rubyonrails Rails | =2.2.2 | |
Rubyonrails Rails | =2.3.2 | |
Rubyonrails Rails | =2.3.3 | |
Rubyonrails Rails | =2.3.4 | |
Rubyonrails Rails | =2.3.9 | |
Rubyonrails Rails | =2.3.10 | |
Rubyonrails Rails | =2.3.11 | |
Rubyonrails Rails | =2.3.12 | |
Rubyonrails Rails | =2.0.0-rc1 | |
Rubyonrails Rails | =2.0.0-rc2 | |
Rubyonrails Rails | =2.0.0 | |
Rubyonrails Rails | =3.0.0-beta | |
Rubyonrails Rails | =3.0.0-beta2 | |
Rubyonrails Rails | =3.0.0-beta3 | |
Rubyonrails Rails | =3.0.0-beta4 | |
Rubyonrails Rails | =3.0.0-rc | |
Rubyonrails Rails | =3.0.0-rc2 | |
Rubyonrails Rails | =3.0.1-pre | |
Rubyonrails Rails | =3.0.2-pre | |
Rubyonrails Rails | =3.0.0 | |
Rubyonrails Rails | =3.0.10-rc1 | |
Rubyonrails Rails | =3.1.0-beta1 | |
Rubyonrails Rails | =3.1.0-rc1 | |
Rubyonrails Rails | =3.1.0-rc2 | |
Rubyonrails Rails | =3.1.0-rc3 | |
Rubyonrails Rails | =3.1.0-rc4 | |
Rubyonrails Rails | =3.1.0 | |
Rubyonrails Rails | =3.0.1 | |
Rubyonrails Rails | =3.0.2 | |
Rubyonrails Rails | =3.0.3 | |
Rubyonrails Rails | =3.0.4-rc1 | |
Rubyonrails Rails | =3.0.5 | |
Rubyonrails Rails | =3.0.5-rc1 | |
Rubyonrails Rails | =3.0.6-rc1 | |
Rubyonrails Rails | =3.0.6-rc2 | |
Rubyonrails Rails | =3.0.6 | |
Rubyonrails Rails | =3.0.7-rc1 | |
Rubyonrails Rails | =3.0.7-rc2 | |
Rubyonrails Rails | =3.0.7 | |
Rubyonrails Rails | =3.0.8-rc1 | |
Rubyonrails Rails | =3.0.8-rc2 | |
Rubyonrails Rails | =3.0.8-rc3 | |
Rubyonrails Rails | =3.0.8-rc4 | |
Rubyonrails Rails | =3.0.8 | |
Rubyonrails Rails | =3.0.9-rc1 | |
Rubyonrails Rails | =3.0.9-rc2 | |
Rubyonrails Rails | =3.0.9-rc3 | |
Rubyonrails Rails | =3.0.9-rc4 | |
Rubyonrails Rails | =3.0.9 | |
Rubyonrails Rails | =3.0.9-rc5 | |
redhat/rubygem-activerecord | <2.3.13 | 2.3.13 |
redhat/rubygem-activerecord | <3.0.10 | 3.0.10 |
redhat/rubygem-activerecord | <3.1.0 | 3.1.0 |
rubygems/activerecord | >=3.0.0<3.0.10 | 3.0.10 |
rubygems/activerecord | >=2.0.0<2.3.13 | 2.3.13 |
http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.