logo

CVE-2012-2695 activerecord

Package

Manager: gem
Name: activerecord
Vulnerable Version: >=3.0.0.beta <3.0.14 || >=3.1.0 <3.1.6 || >=3.2.0 <3.2.6 || >=0 <2.3.15

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00641 pctl0.69666

Details

activerecord vulnerable to SQL Injection The Active Record component in Ruby on Rails efore 2.3.15, 3.0.x before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.

Metadata

Created: 2017-10-24T18:33:38Z
Modified: 2025-01-21T15:12:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-76wq-xw4h-f8wj/GHSA-76wq-xw4h-f8wj.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-76wq-xw4h-f8wj
Finding: F297
Auto approve: 1