Summary: | <dev-ruby/rails-{3.0.15,3.1.6,3.2.5}: SQL injection vulnerability (CVE-2012-{2660,2661}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Hans de Graaff <graaff> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | news.gdc, ruby |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://weblog.rubyonrails.org/2012/5/31/ann-rails-3-2-4-has-been-released/ | ||
Whiteboard: | ~3 [noglsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 420923 | ||
Bug Blocks: |
Description
Hans de Graaff
2012-06-01 06:49:50 UTC
dev-ruby/rails-3.2.5 is now in the gentoo tree. I'll try to look at the older slots in the weekend. Thanks, Hans. Rating as ~3 for now until it is confirmed whether or not 2.3.x is affected. (In reply to comment #2) > Thanks, Hans. > > Rating as ~3 for now until it is confirmed whether or not 2.3.x is affected. 2.3.x is not affected by the SQL injection since that is new code in 3.x. I can't determine if the other vulnerability applies to 2.3.x since the code is so extensively rewritten since. Note that upstream no longer security-supports 2.3.x... dev-ruby/rails-3.0.15 is now in the tree. Let's work in bug 420923. I think we just need a 3.1.x to fix both issues. Issue fixed with bug 420923. Thanks, everyone. Closing noglsa for ~arch only. CVE-2012-2661 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2661): The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695. CVE-2012-2660 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2660): actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2694. |