First published: Thu Feb 20 2014(Updated: )
SQL injection vulnerability in `activerecord/lib/active_record/connection_adapters/postgresql/cast.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL is used, allows remote attackers to execute "add data" SQL commands via vectors involving `\` (backslash) characters that are not properly handled in operations on array columns.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/activerecord | =4.1.0.beta1 | 4.1.0.beta2 |
rubygems/activerecord | >=4.0.0<4.0.3 | 4.0.3 |
Ruby on Rails | =4.0.0 | |
Ruby on Rails | =4.0.0-beta | |
Ruby on Rails | =4.0.0-rc1 | |
Ruby on Rails | =4.0.0-rc2 | |
Ruby on Rails | =4.0.1 | |
Ruby on Rails | =4.0.1-rc1 | |
Ruby on Rails | =4.0.1-rc2 | |
Ruby on Rails | =4.0.1-rc3 | |
Ruby on Rails | =4.0.1-rc4 | |
Ruby on Rails | =4.0.2 | |
Ruby on Rails | =4.1.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0080 has a medium severity level as it allows remote attackers to perform SQL injection, potentially compromising data integrity.
To fix CVE-2014-0080, upgrade to Active Record version 4.0.3 or 4.1.0.beta2 or later.
CVE-2014-0080 affects Ruby on Rails versions 4.0.0 to 4.0.2 and 4.1.0.beta1 when PostgreSQL is used.
Yes, CVE-2014-0080 can be exploited remotely due to the SQL injection vulnerability in specified versions of Active Record.
CVE-2014-0080 impacts the Active Record component of Ruby on Rails, specifically in PostgreSQL adapter files.