First published: Wed Aug 20 2014(Updated: )
`activerecord/lib/active_record/relation/query_methods.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes `create_with` calls.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/activerecord | >=4.1.0<4.1.5 | 4.1.5 |
rubygems/activerecord | >=4.0.0<4.0.9 | 4.0.9 |
Rubyonrails Rails | =4.0.0 | |
Rubyonrails Rails | =4.0.0-beta | |
Rubyonrails Rails | =4.0.0-rc1 | |
Rubyonrails Rails | =4.0.0-rc2 | |
Rubyonrails Rails | =4.0.1 | |
Rubyonrails Rails | =4.0.1-rc1 | |
Rubyonrails Rails | =4.0.1-rc2 | |
Rubyonrails Rails | =4.0.1-rc3 | |
Rubyonrails Rails | =4.0.1-rc4 | |
Rubyonrails Rails | =4.0.2 | |
Rubyonrails Rails | =4.0.3 | |
Rubyonrails Rails | =4.0.4 | |
Rubyonrails Rails | =4.0.5 | |
Rubyonrails Rails | =4.0.6 | |
Rubyonrails Rails | =4.0.6-rc1 | |
Rubyonrails Rails | =4.0.6-rc2 | |
Rubyonrails Rails | =4.0.6-rc3 | |
Rubyonrails Rails | =4.0.7 | |
Rubyonrails Rails | =4.0.8 | |
Rubyonrails Rails | =4.1.0 | |
Rubyonrails Rails | =4.1.0-beta1 | |
Rubyonrails Rails | =4.1.1 | |
Rubyonrails Rails | =4.1.2 | |
Rubyonrails Rails | =4.1.2-rc1 | |
Rubyonrails Rails | =4.1.2-rc2 | |
Rubyonrails Rails | =4.1.2-rc3 | |
Rubyonrails Rails | =4.1.3 | |
Rubyonrails Rails | =4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.