CVE-2012-2695 – activerecord
Package
Manager: gem
Name: activerecord
Vulnerable Version: >=3.0.0.beta <3.0.14 || >=3.1.0 <3.1.6 || >=3.2.0 <3.2.6 || >=0 <2.3.15
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00641 pctl0.69666
Details
activerecord vulnerable to SQL Injection The Active Record component in Ruby on Rails efore 2.3.15, 3.0.x before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.
Metadata
Created: 2017-10-24T18:33:38Z
Modified: 2025-01-21T15:12:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-76wq-xw4h-f8wj/GHSA-76wq-xw4h-f8wj.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-76wq-xw4h-f8wj
Finding: F297
Auto approve: 1