|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 2597-1 (rails - input validation error)|
|Summary:||joernchen of Phenoelit discovered that rails, an MVC ruby based framework;geared for web application development, is not properly treating;user-supplied input to find_by_*;methods. Depending on how the;ruby on rails application is using these methods, this allows an attacker;to perform SQL injection attacks, e.g., to bypass authentication if;Authlogic is used and the session secret token is known.|
joernchen of Phenoelit discovered that rails, an MVC ruby based framework
geared for web application development, is not properly treating
user-supplied input to find_by_*
methods. Depending on how the
ruby on rails application is using these methods, this allows an attacker
to perform SQL injection attacks, e.g., to bypass authentication if
Authlogic is used and the session secret token is known.
rails on Debian Linux
For the stable distribution (squeeze), this problem has been fixed in
For the testing distribution (wheezy), this problem will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in
ruby-activerecord-2.3 version 2.3.14-3.
We recommend that you upgrade your rails/ruby-activerecord-2.3 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-6497|
BugTraq ID: 57084
Common Vulnerability Exposure (CVE) ID: CVE-2012-6496
RedHat Security Advisories: RHSA-2013:0154
RedHat Security Advisories: RHSA-2013:0155
RedHat Security Advisories: RHSA-2013:0220
RedHat Security Advisories: RHSA-2013:0544
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.