[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-3221Date: (C)2013-04-26   (M)2023-12-22


The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks against Ruby on Rails applications via a crafted value, as demonstrated by unintended interaction between the "typed XML" feature and a MySQL database.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.4
Exploit Score: 10.0
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: NONE
  
Reference:
http://openwall.com/lists/oss-security/2013/02/06/7
http://openwall.com/lists/oss-security/2013/04/24/7
https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce?dmode=source&output=gplain
http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails/
http://www.phenoelit.org/blog/archives/2013/02/index.html
https://gist.github.com/dakull/5442275

CPE    1
cpe:/a:rubyonrails:ruby_on_rails:3.0.4
CWE    1
CWE-20

© SecPod Technologies