reassign 675396 ruby-activerecord-3.2
thank you

On Thu, May 31, 2012 at 10:12 PM, Henri Salo <[email protected]> wrote:
> Package: rails
> Severity: important
> Tags: security, patch
>
> http://seclists.org/oss-sec/2012/q2/448
>
> """
> SQL Injection Vulnerability in Ruby on Rails
>
> There is a SQL injection vulnerability in Active Record, version 3.0 and 
> later. This vulnerability has been assigned the CVE identifier CVE-2012-2661.
>
> Versions Affected:  3.0.0 and ALL later versions
> Not affected:       2.3.14
> Fixed Versions:     3.2.4, 3.1.5, 3.0.13
>
> Impact
> ------
> Due to the way Active Record handles nested query parameters, an attacker can 
> use a specially crafted request to inject some forms of SQL into your 
> application's SQL queries.
>
> All users running an affected release should upgrade immediately.
>
> Impacted code directly passes request params to the `where` method of an 
> ActiveRecord class like this:
>
>    Post.where(:id => params[:id]).all
>
> An attacker can make a request that causes `params[:id]` to return a 
> specially crafted hash that will cause the WHERE clause of the SQL statement 
> to query an arbitrary table with some value.
>
> Releases
> --------
> The FIXED releases are available at the normal locations.
>
> Workarounds
> -----------
> This issue can be mitigated by casting the parameter to an expected value.  
> For example, change this:
>
>    Post.where(:id => params[:id]).all
>
> to this:
>
>    Post.where(:id => params[:id].to_s).all
>
> Patches
> -------
> To aid users who aren't able to upgrade immediately we have provided patches 
> for the two supported release series.  They are in git-am format and consist 
> of a single changeset.  We have also provided a patch for the 3.0 series 
> despite the fact it is unmaintained.
>
> * 3-0-params_sql_injection.patch - Patch for 3.0 series
> * 3-1-params_sql_injection.patch - Patch for 3.1 series
> * 3-2-params_sql_injection.patch - Patch for 3.2 series
>
> Please note that only the  3.1.x and 3.2.x series are supported at present.  
> Users of earlier unsupported releases are advised to upgrade as soon as 
> possible as we cannot guarantee the continued availability of security fixes 
> for unsupported releases.
>
> Credits
> -------
>
> Thanks to Ben Murphy for reporting the vulnerability to us, and to Chad Pyne 
> of thoughtbot for helping us verify the fix.
> """
>
> -- System Information:
> Debian Release: 6.0.5
>  APT prefers stable-updates
>  APT policy: (500, 'stable-updates'), (500, 'stable')
> Architecture: amd64 (x86_64)
>
> Kernel: Linux 2.6.32-5-amd64 (SMP w/8 CPU cores)
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: 
> LC_ALL set to en_US.UTF-8)
> Shell: /bin/sh linked to /bin/dash
>
>
>



-- 
Ondřej Surý <[email protected]>



--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to