Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:36688
HistoryAug 12, 2022 - 5:40 a.m.

SQL Injection

2022-08-1205:40:41
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
9

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

31.3%

update_by_case is vulnerable to sql injection. The vulnerability exists in the update_by_case! function in update_by_case.rb as it calls some functions in utils.rb that use custom sql strings which are not properly sanitized, which allows an attacker to inject and execute arbitrary SQL commands.

CPENameOperatorVersion
update_by_casele0.1.2
update_by_casele0.1.2

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

31.3%

Related for VERACODE:36688