File tree Expand file tree Collapse file tree 2 files changed +72
-0
lines changed
Expand file tree Collapse file tree 2 files changed +72
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' GHSA-5qw5-wf2q-f538 (activerecord-jdbc-adapter): ActiveRecord-JDBC-Adapter
4+ (AR-JDBC) lib/arjdbc/jdbc/adapter.rb sql.gsub() Function SQL Injection'
5+ comments : false
6+ categories :
7+ - activerecord-jdbc-adapter
8+ - jruby
9+ advisory :
10+ gem : activerecord-jdbc-adapter
11+ platform : jruby
12+ osvdb : 114854
13+ ghsa : 5qw5-wf2q-f538
14+ url : https://github.com/advisories/GHSA-5qw5-wf2q-f538
15+ title : ActiveRecord-JDBC-Adapter (AR-JDBC) lib/arjdbc/jdbc/adapter.rb sql.gsub()
16+ Function SQL Injection
17+ date : 2013-02-25
18+ description : |
19+ ActiveRecord-JDBC-Adapter (AR-JDBC) contains a flaw that may allow carrying
20+ out an SQL injection attack. The issue is due to the sql.gsub() function in
21+ lib/arjdbc/jdbc/adapter.rb not properly sanitizing user-supplied input before
22+ using it in SQL queries. This may allow a remote attacker to inject or
23+ manipulate SQL queries in the back-end database, allowing for the
24+ manipulation or disclosure of arbitrary data.
25+ unaffected_versions :
26+ - " < 1.2.6"
27+ patched_versions :
28+ - " >= 1.2.8"
29+ related :
30+ url :
31+ - https://github.com/jruby/activerecord-jdbc-adapter/issues/322
32+ - https://github.com/jruby/activerecord-jdbc-adapter/blob/master/lib/arjdbc/jdbc/adapter.rb
33+ - https://my.diffend.io/gems/activerecord-jdbc-adapter/1.2.5/1.2.8
34+ - https://security.snyk.io/vuln/SNYK-RUBY-ACTIVERECORDJDBCADAPTER-20076
35+ - https://github.com/advisories/GHSA-5qw5-wf2q-f538
36+ notes : " - No CVE, CVSS values.\n "
37+ ---
Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' GHSA-mpwp-4h2m-765c (activejob): Active Job - Object injection security vulnerability
4+ if Global IDs'
5+ comments : false
6+ categories :
7+ - activejob
8+ - rails
9+ advisory :
10+ gem : activejob
11+ framework : rails
12+ ghsa : mpwp-4h2m-765c
13+ osvdb : 112347
14+ url : https://github.com/advisories/GHSA-mpwp-4h2m-765c
15+ title : Active Job - Object injection security vulnerability if Global IDs
16+ date : 2014-09-29
17+ description : |
18+ Active Job vulnerability: An Active Job bug allowed String
19+ arguments to be deserialized as if they were Global IDs, an
20+ object injection security vulnerability.
21+
22+ * In release post: "Active Job vulnerability:
23+ We also fixed an Active Job bug that allowed String
24+ arguments to be deserialized as if they were Global IDs,
25+ an object injection security vulnerability.
26+ patched_versions :
27+ - " >= 4.2.0.beta2"
28+ related :
29+ url :
30+ - https://advisories.gitlab.com/pkg/gem/activejob/OSVDB-112347
31+ - https://rubyonrails.org/2014/9/29/Rails-4-2-0-beta2-has-been-released
32+ - https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activejob/OSVDB-112347.yml
33+ - https://github.com/advisories/GHSA-mpwp-4h2m-765c
34+ notes : " - No CVE or CVSS values.\n "
35+ ---
You can’t perform that action at this time.
0 commit comments