First published: Thu Feb 20 2014(Updated: )
SQL injection vulnerability in `activerecord/lib/active_record/connection_adapters/postgresql/cast.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL is used, allows remote attackers to execute "add data" SQL commands via vectors involving `\` (backslash) characters that are not properly handled in operations on array columns.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | =4.0.0 | |
Rubyonrails Rails | =4.0.0-beta | |
Rubyonrails Rails | =4.0.0-rc1 | |
Rubyonrails Rails | =4.0.0-rc2 | |
Rubyonrails Rails | =4.0.1 | |
Rubyonrails Rails | =4.0.1-rc1 | |
Rubyonrails Rails | =4.0.1-rc2 | |
Rubyonrails Rails | =4.0.1-rc3 | |
Rubyonrails Rails | =4.0.1-rc4 | |
Rubyonrails Rails | =4.0.2 | |
Rubyonrails Rails | =4.1.0-beta1 | |
rubygems/activerecord | =4.1.0.beta1 | 4.1.0.beta2 |
rubygems/activerecord | >=4.0.0<4.0.3 | 4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.