CVE-2012-2694: Moderate severity vulnerability that affects actionpack
(updated )
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain “[‘xyz’, nil]” values, a related issue to CVE-2012-2660.
References
- lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html
- lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html
- lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html
- lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html
- lists.opensuse.org/opensuse-updates/2012-08/msg00046.html
- rhn.redhat.com/errata/RHSA-2013-0154.html
- github.com/advisories/GHSA-q34c-48gc-m9g8
- groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source&output=gplain
- nvd.nist.gov/vuln/detail/CVE-2012-2694
Detect and mitigate CVE-2012-2694 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →