Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2012-6496

Published: 4 January 2013

SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.

Notes

AuthorNote
mdeslaur
in Oneiric+, rails package is just for transition
seth-arnold
The authlogic gem was frequently cited as the problem in early
reports, but the problem is with core Active Record. authlogic
was just one vector known to allow exploiting the problem.
CVE-2012-5664 was rejected as a result of the confusion.

Priority

Medium

Status

Package Release Status
rails
Launchpad, Ubuntu, Debian
hardy Ignored
(end of life)
lucid Ignored
(end of life)
oneiric Not vulnerable
(contains no code)
precise Not vulnerable
(contains no code)
quantal Not vulnerable
(contains no code)
raring Not vulnerable
(contains no code)
saucy Not vulnerable
(contains no code)
trusty Does not exist
(trusty was not-affected [contains no code])
upstream
Released (3.2.10, 3.1.9, 3.0.18)
utopic Not vulnerable
(contains no code)
vivid Not vulnerable
(contains no code)
wily Not vulnerable
(contains no code)
xenial Not vulnerable
(contains no code)
yakkety Not vulnerable
(contains no code)
zesty Not vulnerable
(contains no code)
Patches:
upstream: https://rubyonrails-security.googlegroups.com/attach/23daa048baf28b64/2-3-dynamic_finder_injection.patch?view=1&part=2
upstream: https://rubyonrails-security.googlegroups.com/attach/23daa048baf28b64/3-0-dynamic_finder_injection.patch?view=1&part=3
upstream: https://rubyonrails-security.googlegroups.com/attach/23daa048baf28b64/3-1-dynamic_finder_injection.patch?view=1&part=4
upstream: https://rubyonrails-security.googlegroups.com/attach/23daa048baf28b64/3-2-dynamic_finder_injection.patch?view=1&part=5


ruby-activerecord-2.3
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Ignored
(end of life)
precise Ignored
(end of life)
quantal Ignored
(end of life)
raring Ignored
(end of life)
saucy Ignored
(end of life)
trusty Does not exist

upstream Ignored
(end of life)
utopic Does not exist

vivid Does not exist

wily Does not exist

xenial Does not exist

yakkety Does not exist

zesty Does not exist

Patches:




upstream: https://rubyonrails-security.googlegroups.com/attach/23daa048baf28b64/2-3-dynamic_finder_injection.patch?view=1&part=2

ruby-activerecord-3.2
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Does not exist

precise Does not exist

quantal Ignored
(end of life)
raring Ignored
(end of life)
saucy Not vulnerable
(3.2.13-4)
trusty Does not exist
(trusty was not-affected [3.2.16-1])
upstream
Released (3.2.10)
utopic Does not exist

vivid Does not exist

wily Does not exist

xenial Does not exist

yakkety Does not exist

zesty Does not exist

Patches:





upstream: https://rubyonrails-security.googlegroups.com/attach/23daa048baf28b64/3-2-dynamic_finder_injection.patch?view=1&part=5