Lucene search

K
cve[email protected]CVE-2022-32224
HistoryDec 05, 2022 - 10:15 p.m.

CVE-2022-32224

2022-12-0522:15:10
CWE-502
web.nvd.nist.gov
109
6
cve-2022-32224
escalation
rce vulnerability
yaml serialized columns
active record
nvd
sql injection

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.3%

A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.

Affected configurations

NVD
Node
activerecord_projectactiverecordRange<5.2.8.1ruby
OR
activerecord_projectactiverecordRange6.0.0–6.0.5.1ruby
OR
activerecord_projectactiverecordRange6.1.0–6.1.6.1ruby
OR
activerecord_projectactiverecordRange7.0.0–7.0.3.1ruby

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "https://github.com/rails/rails",
    "versions": [
      {
        "version": "7.0.3.1, 6.1.6.1, 6.0.5.1, 5.2.8.1",
        "status": "affected"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.3%