CVE-2012-2660 — Improper Access Control in Project Actionpack
Severity
6.4MEDIUMNVD
GHSA4.3OSV4.3
EPSS
0.3%
top 47.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 22
Latest updateAug 13
Description
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2694.
CVSS vector
AV:N/AC:L/C:P/I:P/A:NExploitability: 10.0 | Impact: 4.9
Affected Packages3 packages
🔴Vulnerability Details
7GHSA▶
actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request↗2017-10-24
📋Vendor Advisories
4Red Hat
▶
💬Community
5HackerOne▶
Unsafe Query Generation (CVE-2012-2660, CVE-2012-2694 and CVE-2013-0155) mitigation bypass↗2018-02-07
Bugzilla▶
CVE-2012-2694 rubygem-actionpack: Unsafe query generation (a different flaw than CVE-2012-2660) [fedora-all]↗2012-06-13
Bugzilla▶
CVE-2012-2694 rubygem-actionpack: Unsafe query generation (a different flaw than CVE-2012-2660)↗2012-06-13