CVE-2012-6496: Active Record contains SQL Injection
(updated )
SQL injection vulnerability in the Active Record component in Ruby on Rails before 2.3.15, 3.0.x before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
References
- bugzilla.redhat.com/show_bug.cgi?id=889649
- github.com/advisories/GHSA-gh2w-j7cx-2664
- github.com/rails/rails
- github.com/rails/rails/commit/9de9b359d0d24f70f0f6c5c58a7ad8750684d456
- groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source&output=gplain
- nvd.nist.gov/vuln/detail/CVE-2012-6496
Detect and mitigate CVE-2012-6496 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →