First published: Fri Jun 01 2012(Updated: )
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | =3.0.0 | |
Rubyonrails Rails | =3.0.0-beta | |
Rubyonrails Rails | =3.0.0-beta2 | |
Rubyonrails Rails | =3.0.0-beta3 | |
Rubyonrails Rails | =3.0.0-beta4 | |
Rubyonrails Rails | =3.0.0-rc | |
Rubyonrails Rails | =3.0.0-rc2 | |
Rubyonrails Rails | =3.0.1 | |
Rubyonrails Rails | =3.0.1-pre | |
Rubyonrails Rails | =3.0.2 | |
Rubyonrails Rails | =3.0.2-pre | |
Rubyonrails Rails | =3.0.3 | |
Rubyonrails Rails | =3.0.4-rc1 | |
Rubyonrails Rails | =3.0.5 | |
Rubyonrails Rails | =3.0.5-rc1 | |
Rubyonrails Rails | =3.0.6 | |
Rubyonrails Rails | =3.0.6-rc1 | |
Rubyonrails Rails | =3.0.6-rc2 | |
Rubyonrails Rails | =3.0.7 | |
Rubyonrails Rails | =3.0.7-rc1 | |
Rubyonrails Rails | =3.0.7-rc2 | |
Rubyonrails Rails | =3.0.8 | |
Rubyonrails Rails | =3.0.8-rc1 | |
Rubyonrails Rails | =3.0.8-rc2 | |
Rubyonrails Rails | =3.0.8-rc3 | |
Rubyonrails Rails | =3.0.8-rc4 | |
Rubyonrails Rails | =3.0.9 | |
Rubyonrails Rails | =3.0.9-rc1 | |
Rubyonrails Rails | =3.0.9-rc2 | |
Rubyonrails Rails | =3.0.9-rc3 | |
Rubyonrails Rails | =3.0.9-rc4 | |
Rubyonrails Rails | =3.0.9-rc5 | |
Rubyonrails Rails | =3.0.10 | |
Rubyonrails Rails | =3.0.10-rc1 | |
Rubyonrails Rails | =3.0.11 | |
Rubyonrails Rails | =3.0.12 | |
Rubyonrails Rails | =3.0.12-rc1 | |
Rubyonrails Rails | =3.0.13-rc1 | |
Rubyonrails Ruby On Rails | =3.0.4 | |
Rubyonrails Rails | =3.1.0 | |
Rubyonrails Rails | =3.1.0-beta1 | |
Rubyonrails Rails | =3.1.0-rc1 | |
Rubyonrails Rails | =3.1.0-rc2 | |
Rubyonrails Rails | =3.1.0-rc3 | |
Rubyonrails Rails | =3.1.0-rc4 | |
Rubyonrails Rails | =3.1.0-rc5 | |
Rubyonrails Rails | =3.1.0-rc6 | |
Rubyonrails Rails | =3.1.0-rc7 | |
Rubyonrails Rails | =3.1.0-rc8 | |
Rubyonrails Rails | =3.1.1 | |
Rubyonrails Rails | =3.1.1-rc1 | |
Rubyonrails Rails | =3.1.1-rc2 | |
Rubyonrails Rails | =3.1.1-rc3 | |
Rubyonrails Rails | =3.1.2 | |
Rubyonrails Rails | =3.1.2-rc1 | |
Rubyonrails Rails | =3.1.2-rc2 | |
Rubyonrails Rails | =3.1.3 | |
Rubyonrails Rails | =3.1.4 | |
Rubyonrails Rails | =3.1.4-rc1 | |
Rubyonrails Rails | =3.1.5-rc1 | |
Rubyonrails Rails | =3.2.0 | |
Rubyonrails Rails | =3.2.0-rc1 | |
Rubyonrails Rails | =3.2.0-rc2 | |
Rubyonrails Rails | =3.2.1 | |
Rubyonrails Rails | =3.2.2 | |
Rubyonrails Rails | =3.2.2-rc1 | |
Rubyonrails Rails | =3.2.3 | |
Rubyonrails Rails | =3.2.3-rc1 | |
Rubyonrails Rails | =3.2.3-rc2 | |
Rubyonrails Rails | =3.2.4-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.