First published: Wed Feb 13 2013(Updated: )
ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the `attr_protected` protection mechanism and modify protected model attributes via a crafted request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/activerecord | >=3.2.0<3.2.12 | 3.2.12 |
rubygems/activerecord | >=3.1.0<3.1.11 | 3.1.11 |
rubygems/activerecord | <2.3.17 | 2.3.17 |
Ruby on Rails | =3.2.0 | |
Ruby on Rails | =3.2.0-rc1 | |
Ruby on Rails | =3.2.0-rc2 | |
Ruby on Rails | =3.2.1 | |
Ruby on Rails | =3.2.2 | |
Ruby on Rails | =3.2.2-rc1 | |
Ruby on Rails | =3.2.3 | |
Ruby on Rails | =3.2.3-rc1 | |
Ruby on Rails | =3.2.3-rc2 | |
Ruby on Rails | =3.2.4 | |
Ruby on Rails | =3.2.4-rc1 | |
Ruby on Rails | =3.2.5 | |
Ruby on Rails | =3.2.6 | |
Ruby on Rails | =3.2.7 | |
Ruby on Rails | =3.2.8 | |
Ruby on Rails | =3.2.9 | |
Ruby on Rails | =3.2.10 | |
Ruby on Rails | =3.2.11 | |
Ruby on Rails | =3.1.0 | |
Ruby on Rails | =3.1.0-beta1 | |
Ruby on Rails | =3.1.0-rc1 | |
Ruby on Rails | =3.1.0-rc2 | |
Ruby on Rails | =3.1.0-rc3 | |
Ruby on Rails | =3.1.0-rc4 | |
Ruby on Rails | =3.1.0-rc5 | |
Ruby on Rails | =3.1.0-rc6 | |
Ruby on Rails | =3.1.0-rc7 | |
Ruby on Rails | =3.1.0-rc8 | |
Ruby on Rails | =3.1.1 | |
Ruby on Rails | =3.1.1-rc1 | |
Ruby on Rails | =3.1.1-rc2 | |
Ruby on Rails | =3.1.1-rc3 | |
Ruby on Rails | =3.1.2 | |
Ruby on Rails | =3.1.2-rc1 | |
Ruby on Rails | =3.1.2-rc2 | |
Ruby on Rails | =3.1.3 | |
Ruby on Rails | =3.1.4 | |
Ruby on Rails | =3.1.4-rc1 | |
Ruby on Rails | =3.1.5 | |
Ruby on Rails | =3.1.5-rc1 | |
Ruby on Rails | =3.1.6 | |
Ruby on Rails | =3.1.7 | |
Ruby on Rails | =3.1.8 | |
Ruby on Rails | =3.1.9 | |
Ruby on Rails | =3.1.10 | |
Ruby on Rails | =2.3.0 | |
Ruby on Rails | =2.3.1 | |
Ruby on Rails | =2.3.2 | |
Ruby on Rails | =2.3.3 | |
Ruby on Rails | =2.3.4 | |
Ruby on Rails | =2.3.9 | |
Ruby on Rails | =2.3.10 | |
Ruby on Rails | =2.3.11 | |
Ruby on Rails | =2.3.12 | |
Ruby on Rails | =2.3.13 | |
Ruby on Rails | =2.3.14 | |
Ruby on Rails | =2.3.15 | |
Ruby on Rails | =2.3.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0276 has a medium severity rating due to its potential to allow unauthorized modification of protected attributes in Ruby on Rails applications.
To fix CVE-2013-0276, ensure that you upgrade to the patched versions of Ruby on Rails: 2.3.17, 3.1.11, or 3.2.12 and later.
CVE-2013-0276 affects Ruby on Rails versions prior to 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12.
Yes, CVE-2013-0276 can be exploited by remote attackers through crafted requests to bypass the `attr_protected` mechanisms.
CVE-2013-0276 is considered significant due to the widespread use of Ruby on Rails, making it a common target for attackers.