Skip to content

Commit e9f6f91

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@2a75a71
1 parent 289856d commit e9f6f91

File tree

2 files changed

+72
-0
lines changed

2 files changed

+72
-0
lines changed
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
layout: advisory
3+
title: 'GHSA-5qw5-wf2q-f538 (activerecord-jdbc-adapter): ActiveRecord-JDBC-Adapter
4+
(AR-JDBC) lib/arjdbc/jdbc/adapter.rb sql.gsub() Function SQL Injection'
5+
comments: false
6+
categories:
7+
- activerecord-jdbc-adapter
8+
- jruby
9+
advisory:
10+
gem: activerecord-jdbc-adapter
11+
platform: jruby
12+
osvdb: 114854
13+
ghsa: 5qw5-wf2q-f538
14+
url: https://github.com/advisories/GHSA-5qw5-wf2q-f538
15+
title: ActiveRecord-JDBC-Adapter (AR-JDBC) lib/arjdbc/jdbc/adapter.rb sql.gsub()
16+
Function SQL Injection
17+
date: 2013-02-25
18+
description: |
19+
ActiveRecord-JDBC-Adapter (AR-JDBC) contains a flaw that may allow carrying
20+
out an SQL injection attack. The issue is due to the sql.gsub() function in
21+
lib/arjdbc/jdbc/adapter.rb not properly sanitizing user-supplied input before
22+
using it in SQL queries. This may allow a remote attacker to inject or
23+
manipulate SQL queries in the back-end database, allowing for the
24+
manipulation or disclosure of arbitrary data.
25+
unaffected_versions:
26+
- "< 1.2.6"
27+
patched_versions:
28+
- ">= 1.2.8"
29+
related:
30+
url:
31+
- https://github.com/jruby/activerecord-jdbc-adapter/issues/322
32+
- https://github.com/jruby/activerecord-jdbc-adapter/blob/master/lib/arjdbc/jdbc/adapter.rb
33+
- https://my.diffend.io/gems/activerecord-jdbc-adapter/1.2.5/1.2.8
34+
- https://security.snyk.io/vuln/SNYK-RUBY-ACTIVERECORDJDBCADAPTER-20076
35+
- https://github.com/advisories/GHSA-5qw5-wf2q-f538
36+
notes: "- No CVE, CVSS values.\n"
37+
---
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
layout: advisory
3+
title: 'GHSA-mpwp-4h2m-765c (activejob): Active Job - Object injection security vulnerability
4+
if Global IDs'
5+
comments: false
6+
categories:
7+
- activejob
8+
- rails
9+
advisory:
10+
gem: activejob
11+
framework: rails
12+
ghsa: mpwp-4h2m-765c
13+
osvdb: 112347
14+
url: https://github.com/advisories/GHSA-mpwp-4h2m-765c
15+
title: Active Job - Object injection security vulnerability if Global IDs
16+
date: 2014-09-29
17+
description: |
18+
Active Job vulnerability: An Active Job bug allowed String
19+
arguments to be deserialized as if they were Global IDs, an
20+
object injection security vulnerability.
21+
22+
* In release post: "Active Job vulnerability:
23+
We also fixed an Active Job bug that allowed String
24+
arguments to be deserialized as if they were Global IDs,
25+
an object injection security vulnerability.
26+
patched_versions:
27+
- ">= 4.2.0.beta2"
28+
related:
29+
url:
30+
- https://advisories.gitlab.com/pkg/gem/activejob/OSVDB-112347
31+
- https://rubyonrails.org/2014/9/29/Rails-4-2-0-beta2-has-been-released
32+
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activejob/OSVDB-112347.yml
33+
- https://github.com/advisories/GHSA-mpwp-4h2m-765c
34+
notes: "- No CVE or CVSS values.\n"
35+
---

0 commit comments

Comments
 (0)