CVE-2012-6496
Publication date 4 January 2013
Last updated 24 July 2024
Ubuntu priority
SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
Status
Package | Ubuntu Release | Status |
---|---|---|
rails | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
ruby-activerecord-2.3 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
ruby-activerecord-3.2 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
Notes
mdeslaur
in Oneiric+, rails package is just for transition
seth-arnold
The authlogic gem was frequently cited as the problem in early reports, but the problem is with core Active Record. authlogic was just one vector known to allow exploiting the problem. CVE-2012-5664 was rejected as a result of the confusion.
Patch details
References
Other references
- http://www.openwall.com/lists/oss-security/2013/01/03/5
- http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts
- https://groups.google.com/forum/#!topic/rubyonrails-security/DCNTNp_qjFM
- http://www.openwall.com/lists/oss-security/2013/01/03/12
- https://www.cve.org/CVERecord?id=CVE-2012-6496