logo
DATABASE RESOURCES PRICING ABOUT US

CVE-2016-6317

Description

Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155. #### Bugs * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834154> #### Notes Author| Note ---|--- [seth-arnold](<https://launchpad.net/~seth-arnold>) | In Oneiric-Saucy, rails package is just for transition; The rails package contains actual code from vivid onward [ebarretto](<https://launchpad.net/~ebarretto>) | Only Active Record >= 4.2.0 are affected


Affected Package


OS OS Version Package Name Package Version
ubuntu upstream rails any
ubuntu upstream rails-4.0 any
ubuntu 12.04 ruby-actionpack-2.3 any
ubuntu upstream ruby-actionpack-3.2 any
ubuntu upstream ruby-activemodel-3.2 any
ubuntu 12.04 ruby-activerecord-2.3 any
ubuntu upstream ruby-activerecord-3.2 any
ubuntu 12.04 ruby-activesupport-2.3 any
ubuntu upstream ruby-activesupport-3.2 any
ubuntu 12.04 ruby-rails-2.3 any
ubuntu 14.04 ruby-rails-3.2 any
ubuntu upstream ruby-rails-3.2 any

Related