File tree Expand file tree Collapse file tree 3 files changed +23
-0
lines changed
activerecord-jdbc-adapter Expand file tree Collapse file tree 3 files changed +23
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ gem : activejob
3+ osvdb : 112347
4+ url : https://advisories.gitlab.com/pkg/gem/activejob/OSVDB-112347
5+ title : Active Job - Object injection security vulnerability if Global IDs
6+ date : 2014-09-29
7+ description : |
8+ * In release post: "Active Job vulnerability:
9+ We also fixed an Active Job bug that allowed String
10+ arguments to be deserialized as if they were Global IDs,
11+ an object injection security vulnerability.
12+ patched_versions :
13+ - " >= 4.2.0.beta2"
14+ related :
15+ url :
16+ - https://rubyonrails.org/2014/9/29/Rails-4-2-0-beta2-has-been-released
17+ - https://advisories.gitlab.com/pkg/gem/activejob/OSVDB-112347
18+ notes : |
19+ - No CVE, GHSA, or CVSS values
Original file line number Diff line number Diff line change @@ -25,3 +25,4 @@ related:
2525 - https://security.snyk.io/vuln/SNYK-RUBY-ACTIVERECORDJDBCADAPTER-20076
2626 - https://my.diffend.io/gems/activerecord-jdbc-adapter/1.2.5/1.2.8
2727 - http://osvdb.org/show/osvdb/114854
28+ - https://advisories.gitlab.com/pkg/gem/activerecord-jdbc-adapter/OSVDB-2013-02-25
Original file line number Diff line number Diff line change @@ -18,5 +18,8 @@ patched_versions:
1818 - " >= 1.1.1"
1919related :
2020 url :
21+ - https://nvd.nist.gov/vuln/detail/CVE-2016-10522
2122 - https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173
2223 - https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a
24+ - https://advisories.gitlab.com/pkg/gem/rails_admin/SRCCLR-SID-3173
25+ - https://github.com/advisories/GHSA-pxqr-8v54-m2hj
You can’t perform that action at this time.
0 commit comments