First published: Fri Dec 29 2017(Updated: )
** DISPUTED ** SQL injection vulnerability in the 'where' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | <=5.1.4 | |
<=5.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-17917 is high with a CVSS score of 8.1.
The affected software for CVE-2017-17917 is Ruby on Rails version 5.1.4 and earlier.
CVE-2017-17917 is a SQL injection vulnerability in the 'where' method of Ruby on Rails, allowing remote attackers to execute arbitrary SQL commands via the 'id' parameter.
Yes, there is a dispute regarding CVE-2017-17917 as the vendor states that the 'where' method is not intended for use with untrusted user input.
To mitigate CVE-2017-17917, it is recommended to update to a version of Ruby on Rails that is not affected by the vulnerability.