First published: Fri Jan 04 2013(Updated: )
The Authlogic gem for Ruby on Rails, when used with certain versions before 3.2.10, makes potentially unsafe find_by_id method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in secret_token.rb in an open-source product.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | <3.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6497 is considered a high severity vulnerability due to its potential for SQL injection attacks.
To fix CVE-2012-6497, upgrade the Authlogic gem or Rails framework to version 3.2.10 or later.
CVE-2012-6497 affects Ruby on Rails versions prior to 3.2.10.
CVE-2012-6497 can allow remote attackers to conduct SQL injection attacks via crafted parameters.
The find_by_id method is potentially unsafe in environments with certain configurations and affected versions related to CVE-2012-6497.