First published: Fri Jan 04 2013(Updated: )
SQL injection vulnerability in the Active Record component in Ruby on Rails before 2.3.15, 3.0.x before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/activerecord | <2.3.15 | 2.3.15 |
rubygems/activerecord | >=3.0.0.beta<3.0.18 | 3.0.18 |
rubygems/activerecord | >=3.2.0<3.2.10 | 3.2.10 |
rubygems/activerecord | >=3.1.0<3.1.9 | 3.1.9 |
Ruby on Rails | =3.1.0 | |
Ruby on Rails | =3.1.0-beta1 | |
Ruby on Rails | =3.1.0-rc1 | |
Ruby on Rails | =3.1.0-rc2 | |
Ruby on Rails | =3.1.0-rc3 | |
Ruby on Rails | =3.1.0-rc4 | |
Ruby on Rails | =3.1.0-rc5 | |
Ruby on Rails | =3.1.0-rc6 | |
Ruby on Rails | =3.1.0-rc7 | |
Ruby on Rails | =3.1.0-rc8 | |
Ruby on Rails | =3.1.1 | |
Ruby on Rails | =3.1.1-rc1 | |
Ruby on Rails | =3.1.1-rc2 | |
Ruby on Rails | =3.1.1-rc3 | |
Ruby on Rails | =3.1.2 | |
Ruby on Rails | =3.1.2-rc1 | |
Ruby on Rails | =3.1.2-rc2 | |
Ruby on Rails | =3.1.3 | |
Ruby on Rails | =3.1.4 | |
Ruby on Rails | =3.1.4-rc1 | |
Ruby on Rails | =3.1.5 | |
Ruby on Rails | =3.1.5-rc1 | |
Ruby on Rails | =3.1.6 | |
Ruby on Rails | =3.1.7 | |
Ruby on Rails | =3.1.8 | |
Ruby on Rails | =3.0.0 | |
Ruby on Rails | =3.0.0-beta | |
Ruby on Rails | =3.0.0-beta2 | |
Ruby on Rails | =3.0.0-beta3 | |
Ruby on Rails | =3.0.0-beta4 | |
Ruby on Rails | =3.0.0-rc | |
Ruby on Rails | =3.0.0-rc2 | |
Ruby on Rails | =3.0.1 | |
Ruby on Rails | =3.0.1-pre | |
Ruby on Rails | =3.0.2 | |
Ruby on Rails | =3.0.2-pre | |
Ruby on Rails | =3.0.3 | |
Ruby on Rails | =3.0.4-rc1 | |
Ruby on Rails | =3.0.5 | |
Ruby on Rails | =3.0.5-rc1 | |
Ruby on Rails | =3.0.6 | |
Ruby on Rails | =3.0.6-rc1 | |
Ruby on Rails | =3.0.6-rc2 | |
Ruby on Rails | =3.0.7 | |
Ruby on Rails | =3.0.7-rc1 | |
Ruby on Rails | =3.0.7-rc2 | |
Ruby on Rails | =3.0.8 | |
Ruby on Rails | =3.0.8-rc1 | |
Ruby on Rails | =3.0.8-rc2 | |
Ruby on Rails | =3.0.8-rc3 | |
Ruby on Rails | =3.0.8-rc4 | |
Ruby on Rails | =3.0.9 | |
Ruby on Rails | =3.0.9-rc1 | |
Ruby on Rails | =3.0.9-rc2 | |
Ruby on Rails | =3.0.9-rc3 | |
Ruby on Rails | =3.0.9-rc4 | |
Ruby on Rails | =3.0.9-rc5 | |
Ruby on Rails | =3.0.10 | |
Ruby on Rails | =3.0.10-rc1 | |
Ruby on Rails | =3.0.11 | |
Ruby on Rails | =3.0.12 | |
Ruby on Rails | =3.0.12-rc1 | |
Ruby on Rails | =3.0.13 | |
Ruby on Rails | =3.0.13-rc1 | |
Ruby on Rails | =3.0.14 | |
Ruby on Rails | =3.0.16 | |
Ruby on Rails | <=3.0.17 | |
Ruby on Rails | =3.0.4 | |
Ruby on Rails | =3.2.0 | |
Ruby on Rails | =3.2.0-rc1 | |
Ruby on Rails | =3.2.0-rc2 | |
Ruby on Rails | =3.2.1 | |
Ruby on Rails | =3.2.2 | |
Ruby on Rails | =3.2.2-rc1 | |
Ruby on Rails | =3.2.3 | |
Ruby on Rails | =3.2.3-rc1 | |
Ruby on Rails | =3.2.3-rc2 | |
Ruby on Rails | =3.2.4 | |
Ruby on Rails | =3.2.4-rc1 | |
Ruby on Rails | =3.2.5 | |
Ruby on Rails | =3.2.6 | |
Ruby on Rails | =3.2.7 | |
Ruby on Rails | =3.2.8 | |
Ruby on Rails | =3.2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6496 has a medium severity rating as it allows remote attackers to execute arbitrary SQL commands.
To mitigate CVE-2012-6496, upgrade the Active Record component to version 2.3.15, 3.0.18, 3.1.9, or 3.2.10 or later.
CVE-2012-6496 affects Ruby on Rails versions before 2.3.15, 3.0.x before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10.
CVE-2012-6496 is an SQL injection vulnerability allowing attackers to manipulate SQL queries.
Yes, if your application utilizes the affected versions of Active Record, it may be vulnerable to SQL injection attacks.