First published: Thu Apr 25 2013(Updated: )
Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/devise | >=1.5.0<1.5.4 | 1.5.4 |
rubygems/devise | >=2.0.0<2.0.5 | 2.0.5 |
rubygems/devise | >=2.1.0<2.1.3 | 2.1.3 |
rubygems/devise | >=2.2.0<2.2.3 | 2.2.3 |
Plataformatec Devise | =1.5.0 | |
Plataformatec Devise | =1.5.1 | |
Plataformatec Devise | =1.5.2 | |
Plataformatec Devise | =1.5.3 | |
Plataformatec Devise | =2.0.0 | |
Plataformatec Devise | =2.0.1 | |
Plataformatec Devise | =2.0.2 | |
Plataformatec Devise | =2.0.3 | |
Plataformatec Devise | =2.0.4 | |
Plataformatec Devise | =2.1.0 | |
Plataformatec Devise | =2.1.1 | |
Plataformatec Devise | =2.1.2 | |
Plataformatec Devise | =2.2.0 | |
Plataformatec Devise | =2.2.1 | |
Plataformatec Devise | =2.2.2 | |
Ruby-lang Ruby | ||
openSUSE openSUSE | =12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.