CVE-2022-32224 – activerecord
Package
Manager: gem
Name: activerecord
Vulnerable Version: >=7.0.0 <7.0.3.1 || >=6.1.0 <6.1.6.1 || >=6.0.0 <6.0.5.1 || >=0 <5.2.8.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0152 pctl0.80558
Details
Active Record RCE bug with Serialized Columns When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE. There are no feasible workarounds for this issue, but other coders (such as JSON) are not impacted.
Metadata
Created: 2022-07-12T19:39:47Z
Modified: 2022-12-08T15:33:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-3hhc-qp5v-9p2j/GHSA-3hhc-qp5v-9p2j.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-3hhc-qp5v-9p2j
Finding: F096
Auto approve: 1