First published: Wed Aug 20 2014(Updated: )
`activerecord/lib/active_record/relation/query_methods.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes `create_with` calls.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/activerecord | >=4.1.0<4.1.5 | 4.1.5 |
rubygems/activerecord | >=4.0.0<4.0.9 | 4.0.9 |
Ruby on Rails | =4.0.0 | |
Ruby on Rails | =4.0.0-beta | |
Ruby on Rails | =4.0.0-rc1 | |
Ruby on Rails | =4.0.0-rc2 | |
Ruby on Rails | =4.0.1 | |
Ruby on Rails | =4.0.1-rc1 | |
Ruby on Rails | =4.0.1-rc2 | |
Ruby on Rails | =4.0.1-rc3 | |
Ruby on Rails | =4.0.1-rc4 | |
Ruby on Rails | =4.0.2 | |
Ruby on Rails | =4.0.3 | |
Ruby on Rails | =4.0.4 | |
Ruby on Rails | =4.0.5 | |
Ruby on Rails | =4.0.6 | |
Ruby on Rails | =4.0.6-rc1 | |
Ruby on Rails | =4.0.6-rc2 | |
Ruby on Rails | =4.0.6-rc3 | |
Ruby on Rails | =4.0.7 | |
Ruby on Rails | =4.0.8 | |
Ruby on Rails | =4.1.0 | |
Ruby on Rails | =4.1.0-beta1 | |
Ruby on Rails | =4.1.1 | |
Ruby on Rails | =4.1.2 | |
Ruby on Rails | =4.1.2-rc1 | |
Ruby on Rails | =4.1.2-rc2 | |
Ruby on Rails | =4.1.2-rc3 | |
Ruby on Rails | =4.1.3 | |
Ruby on Rails | =4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3514 is classified as a moderate severity vulnerability.
To fix CVE-2014-3514, upgrade Active Record to version 4.0.9 or 4.1.5 or later.
CVE-2014-3514 affects Ruby on Rails versions 4.0.x before 4.0.9 and 4.1.x before 4.1.5.
Yes, CVE-2014-3514 allows remote attackers to bypass strong parameters protection.
If exploited, CVE-2014-3514 could lead to unauthorized access to application data.