First published: Fri Jan 04 2013(Updated: )
SQL injection vulnerability in the Active Record component in Ruby on Rails before 2.3.15, 3.0.x before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/activerecord | <2.3.15 | 2.3.15 |
rubygems/activerecord | >=3.0.0.beta<3.0.18 | 3.0.18 |
rubygems/activerecord | >=3.2.0<3.2.10 | 3.2.10 |
rubygems/activerecord | >=3.1.0<3.1.9 | 3.1.9 |
rubyonrails Rails | =3.1.0 | |
rubyonrails Rails | =3.1.0-beta1 | |
rubyonrails Rails | =3.1.0-rc1 | |
rubyonrails Rails | =3.1.0-rc2 | |
rubyonrails Rails | =3.1.0-rc3 | |
rubyonrails Rails | =3.1.0-rc4 | |
rubyonrails Rails | =3.1.0-rc5 | |
rubyonrails Rails | =3.1.0-rc6 | |
rubyonrails Rails | =3.1.0-rc7 | |
rubyonrails Rails | =3.1.0-rc8 | |
rubyonrails Rails | =3.1.1 | |
rubyonrails Rails | =3.1.1-rc1 | |
rubyonrails Rails | =3.1.1-rc2 | |
rubyonrails Rails | =3.1.1-rc3 | |
rubyonrails Rails | =3.1.2 | |
rubyonrails Rails | =3.1.2-rc1 | |
rubyonrails Rails | =3.1.2-rc2 | |
rubyonrails Rails | =3.1.3 | |
rubyonrails Rails | =3.1.4 | |
rubyonrails Rails | =3.1.4-rc1 | |
rubyonrails Rails | =3.1.5 | |
rubyonrails Rails | =3.1.5-rc1 | |
rubyonrails Rails | =3.1.6 | |
rubyonrails Rails | =3.1.7 | |
rubyonrails Rails | =3.1.8 | |
rubyonrails Rails | =3.0.0 | |
rubyonrails Rails | =3.0.0-beta | |
rubyonrails Rails | =3.0.0-beta2 | |
rubyonrails Rails | =3.0.0-beta3 | |
rubyonrails Rails | =3.0.0-beta4 | |
rubyonrails Rails | =3.0.0-rc | |
rubyonrails Rails | =3.0.0-rc2 | |
rubyonrails Rails | =3.0.1 | |
rubyonrails Rails | =3.0.1-pre | |
rubyonrails Rails | =3.0.2 | |
rubyonrails Rails | =3.0.2-pre | |
rubyonrails Rails | =3.0.3 | |
rubyonrails Rails | =3.0.4-rc1 | |
rubyonrails Rails | =3.0.5 | |
rubyonrails Rails | =3.0.5-rc1 | |
rubyonrails Rails | =3.0.6 | |
rubyonrails Rails | =3.0.6-rc1 | |
rubyonrails Rails | =3.0.6-rc2 | |
rubyonrails Rails | =3.0.7 | |
rubyonrails Rails | =3.0.7-rc1 | |
rubyonrails Rails | =3.0.7-rc2 | |
rubyonrails Rails | =3.0.8 | |
rubyonrails Rails | =3.0.8-rc1 | |
rubyonrails Rails | =3.0.8-rc2 | |
rubyonrails Rails | =3.0.8-rc3 | |
rubyonrails Rails | =3.0.8-rc4 | |
rubyonrails Rails | =3.0.9 | |
rubyonrails Rails | =3.0.9-rc1 | |
rubyonrails Rails | =3.0.9-rc2 | |
rubyonrails Rails | =3.0.9-rc3 | |
rubyonrails Rails | =3.0.9-rc4 | |
rubyonrails Rails | =3.0.9-rc5 | |
rubyonrails Rails | =3.0.10 | |
rubyonrails Rails | =3.0.10-rc1 | |
rubyonrails Rails | =3.0.11 | |
rubyonrails Rails | =3.0.12 | |
rubyonrails Rails | =3.0.12-rc1 | |
rubyonrails Rails | =3.0.13 | |
rubyonrails Rails | =3.0.13-rc1 | |
rubyonrails Rails | =3.0.14 | |
rubyonrails Rails | =3.0.16 | |
Ruby on Rails | <=3.0.17 | |
Ruby on Rails | =3.0.4 | |
rubyonrails Rails | =3.2.0 | |
rubyonrails Rails | =3.2.0-rc1 | |
rubyonrails Rails | =3.2.0-rc2 | |
rubyonrails Rails | =3.2.1 | |
rubyonrails Rails | =3.2.2 | |
rubyonrails Rails | =3.2.2-rc1 | |
rubyonrails Rails | =3.2.3 | |
rubyonrails Rails | =3.2.3-rc1 | |
rubyonrails Rails | =3.2.3-rc2 | |
rubyonrails Rails | =3.2.4 | |
rubyonrails Rails | =3.2.4-rc1 | |
rubyonrails Rails | =3.2.5 | |
rubyonrails Rails | =3.2.6 | |
rubyonrails Rails | =3.2.7 | |
rubyonrails Rails | =3.2.8 | |
rubyonrails Rails | =3.2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.