First published: Mon Jul 07 2014(Updated: )
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby on Rails | =2.0.0 | |
Ruby on Rails | =2.0.0-rc1 | |
Ruby on Rails | =2.0.0-rc2 | |
Ruby on Rails | =2.0.1 | |
Ruby on Rails | =2.0.2 | |
Ruby on Rails | =2.0.4 | |
Ruby on Rails | =2.1.0 | |
Ruby on Rails | =2.1.1 | |
Ruby on Rails | =2.1.2 | |
Ruby on Rails | =2.2.0 | |
Ruby on Rails | =2.2.1 | |
Ruby on Rails | =2.2.2 | |
Ruby on Rails | =2.3.0 | |
Ruby on Rails | =2.3.1 | |
Ruby on Rails | =2.3.2 | |
Ruby on Rails | =2.3.3 | |
Ruby on Rails | =2.3.4 | |
Ruby on Rails | =2.3.9 | |
Ruby on Rails | =2.3.10 | |
Ruby on Rails | =2.3.11 | |
Ruby on Rails | =2.3.12 | |
Ruby on Rails | =2.3.13 | |
Ruby on Rails | =2.3.14 | |
Ruby on Rails | =2.3.15 | |
Ruby on Rails | =2.3.16 | |
Ruby on Rails | =2.3.18 | |
Ruby on Rails | =3.0.0 | |
Ruby on Rails | =3.0.0-beta | |
Ruby on Rails | =3.0.0-beta2 | |
Ruby on Rails | =3.0.0-beta3 | |
Ruby on Rails | =3.0.0-beta4 | |
Ruby on Rails | =3.0.0-rc | |
Ruby on Rails | =3.0.0-rc2 | |
Ruby on Rails | =3.0.1 | |
Ruby on Rails | =3.0.1-pre | |
Ruby on Rails | =3.0.2 | |
Ruby on Rails | =3.0.2-pre | |
Ruby on Rails | =3.0.3 | |
Ruby on Rails | =3.0.4-rc1 | |
Ruby on Rails | =3.0.5 | |
Ruby on Rails | =3.0.5-rc1 | |
Ruby on Rails | =3.0.6 | |
Ruby on Rails | =3.0.6-rc1 | |
Ruby on Rails | =3.0.6-rc2 | |
Ruby on Rails | =3.0.7 | |
Ruby on Rails | =3.0.7-rc1 | |
Ruby on Rails | =3.0.7-rc2 | |
Ruby on Rails | =3.0.8 | |
Ruby on Rails | =3.0.8-rc1 | |
Ruby on Rails | =3.0.8-rc2 | |
Ruby on Rails | =3.0.8-rc3 | |
Ruby on Rails | =3.0.8-rc4 | |
Ruby on Rails | =3.0.9 | |
Ruby on Rails | =3.0.9-rc1 | |
Ruby on Rails | =3.0.9-rc2 | |
Ruby on Rails | =3.0.9-rc3 | |
Ruby on Rails | =3.0.9-rc4 | |
Ruby on Rails | =3.0.9-rc5 | |
Ruby on Rails | =3.0.10 | |
Ruby on Rails | =3.0.10-rc1 | |
Ruby on Rails | =3.0.11 | |
Ruby on Rails | =3.0.12 | |
Ruby on Rails | =3.0.12-rc1 | |
Ruby on Rails | =3.0.13 | |
Ruby on Rails | =3.0.13-rc1 | |
Ruby on Rails | =3.0.14 | |
Ruby on Rails | =3.0.16 | |
Ruby on Rails | =3.0.17 | |
Ruby on Rails | =3.0.18 | |
Ruby on Rails | =3.0.19 | |
Ruby on Rails | =3.0.20 | |
Ruby on Rails | =3.1.0 | |
Ruby on Rails | =3.1.0-beta1 | |
Ruby on Rails | =3.1.0-rc1 | |
Ruby on Rails | =3.1.0-rc2 | |
Ruby on Rails | =3.1.0-rc3 | |
Ruby on Rails | =3.1.0-rc4 | |
Ruby on Rails | =3.1.0-rc5 | |
Ruby on Rails | =3.1.0-rc6 | |
Ruby on Rails | =3.1.0-rc7 | |
Ruby on Rails | =3.1.0-rc8 | |
Ruby on Rails | =3.1.1 | |
Ruby on Rails | =3.1.1-rc1 | |
Ruby on Rails | =3.1.1-rc2 | |
Ruby on Rails | =3.1.1-rc3 | |
Ruby on Rails | =3.1.2 | |
Ruby on Rails | =3.1.2-rc1 | |
Ruby on Rails | =3.1.2-rc2 | |
Ruby on Rails | =3.1.3 | |
Ruby on Rails | =3.1.4 | |
Ruby on Rails | =3.1.4-rc1 | |
Ruby on Rails | =3.1.5 | |
Ruby on Rails | =3.1.5-rc1 | |
Ruby on Rails | =3.1.6 | |
Ruby on Rails | =3.1.7 | |
Ruby on Rails | =3.1.8 | |
Ruby on Rails | =3.1.9 | |
Ruby on Rails | =3.1.10 | |
Ruby on Rails | =3.2.0 | |
Ruby on Rails | =3.2.0-rc1 | |
Ruby on Rails | =3.2.0-rc2 | |
Ruby on Rails | =3.2.1 | |
Ruby on Rails | =3.2.2 | |
Ruby on Rails | =3.2.2-rc1 | |
Ruby on Rails | =3.2.3 | |
Ruby on Rails | =3.2.3-rc1 | |
Ruby on Rails | =3.2.3-rc2 | |
Ruby on Rails | =3.2.4 | |
Ruby on Rails | =3.2.4-rc1 | |
Ruby on Rails | =3.2.5 | |
Ruby on Rails | =3.2.6 | |
Ruby on Rails | =3.2.7 | |
Ruby on Rails | =3.2.8 | |
Ruby on Rails | =3.2.9 | |
Ruby on Rails | =3.2.10 | |
Ruby on Rails | =3.2.11 | |
Ruby on Rails | =3.2.12 | |
Ruby on Rails | =3.2.13-rc1 | |
Ruby on Rails | =3.2.13-rc2 | |
Ruby on Rails | =3.2.15-rc3 | |
Ruby on Rails | =3.2.16 | |
Ruby on Rails | =3.2.17 | |
Ruby on Rails | =3.2.18 | |
Ruby on Rails | =2.3.17 | |
Ruby on Rails | =3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3482 has been classified as a high severity vulnerability due to its potential for remote SQL injection attacks.
To fix CVE-2014-3482, upgrade to Ruby on Rails version 3.2.19 or later.
CVE-2014-3482 affects Ruby on Rails versions 2.x and 3.x prior to 3.2.19, specifically when using the PostgreSQL adapter.
CVE-2014-3482 allows attackers to execute arbitrary SQL commands through SQL injection due to improper bitstring quoting.
Yes, users of vulnerable versions of Ruby on Rails who have not updated may still be at risk from CVE-2014-3482.