Skip to content

Commit

Permalink
Merge pull request #5201 from github/levpachmanov-GHSA-q34c-48gc-m9g8
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] authored Jan 20, 2025
2 parents 1c449dd + cf1e451 commit ae08579
Showing 1 changed file with 12 additions and 4 deletions.
Original file line number Diff line number Diff line change
@@ -1,14 +1,16 @@
{
"schema_version": "1.4.0",
"id": "GHSA-q34c-48gc-m9g8",
"modified": "2023-05-12T17:20:28Z",
"modified": "2023-11-10T05:02:57Z",
"published": "2017-10-24T18:33:38Z",
"aliases": [
"CVE-2012-2694"
],
"summary": "actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request",
"details": "`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain `['xyz', nil]` values, a related issue to CVE-2012-2660.",
"severity": [],
"severity": [

],
"affected": [
{
"package": {
Expand All @@ -20,7 +22,7 @@
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
"introduced": "3.0.13"
},
{
"fixed": "3.0.14"
Expand Down Expand Up @@ -73,6 +75,10 @@
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2694"
},
{
"type": "WEB",
"url": "https://github.com/rails/rails/commit/2f3bc0467311781ac1ceb2c8c2b09002c8fe143a"
},
{
"type": "PACKAGE",
"url": "https://github.com/rails/rails"
Expand Down Expand Up @@ -115,7 +121,9 @@
}
],
"database_specific": {
"cwe_ids": [],
"cwe_ids": [

],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:50:37Z",
Expand Down

0 comments on commit ae08579

Please sign in to comment.