Rapid7 Vulnerability & Exploit Database

Ruby on Rails: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CVE-2012-6496)

Back to Search

Ruby on Rails: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CVE-2012-6496)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
01/04/2013
Created
01/23/2020
Added
01/03/2020
Modified
01/03/2020

Description

SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.

Solution(s)

  • ruby-on-rails-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;