7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
59.6%
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit
and (2) :offset
parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
CPE | Name | Operator | Version |
---|---|---|---|
activerecord | lt | 2.1.1 |
lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
rails.lighthouseapp.com/projects/8994/tickets/288
rails.lighthouseapp.com/projects/8994/tickets/964
www.openwall.com/lists/oss-security/2008/09/13/2
www.openwall.com/lists/oss-security/2008/09/16/1
www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter
exchange.xforce.ibmcloud.com/vulnerabilities/45109
github.com/advisories/GHSA-xf96-32q2-9rw2
github.com/rails/rails/commit/ef0ea782b1f5cf7b08e74ea3002a16c708f66645
github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2008-4094.yml
nvd.nist.gov/vuln/detail/CVE-2008-4094
web.archive.org/web/20080620000955/blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1
web.archive.org/web/20080620201733/blog.innerewut.de/files/rails/activerecord-1.15.3.patch
web.archive.org/web/20080620201744/blog.innerewut.de/files/rails/activerecord-2.0.2.patch
web.archive.org/web/20081104151751/gist.github.com/8946
web.archive.org/web/20081113122736/secunia.com/advisories/31875/
web.archive.org/web/20081207211431/secunia.com/advisories/31909
web.archive.org/web/20081207211436/secunia.com/advisories/31910
web.archive.org/web/20091101000000*/www.vupen.com/english/advisories/2008/2562
web.archive.org/web/20120120194518/www.securityfocus.com/bid/31176
web.archive.org/web/20201207112829/www.securitytracker.com/id?1020871