vulnerability
Ruby on Rails: Improper Access Control (CVE-2016-6317)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Sep 7, 2016 | May 2, 2017 | Nov 27, 2024 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Sep 7, 2016
Added
May 2, 2017
Modified
Nov 27, 2024
Description
Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.
Solution
ruby-on-rails-upgrade-latest
References
- CVE-2016-6317
- https://attackerkb.com/topics/CVE-2016-6317
- URL-http://rhn.redhat.com/errata/RHSA-2016-1855.html
- URL-http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/
- URL-http://www.openwall.com/lists/oss-security/2016/08/11/4
- URL-http://www.securityfocus.com/bid/92434
- URL-https://groups.google.com/forum/#%21topic/ruby-security-ann/WccgKSKiPZA

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.