CVE-2022-32224Deserialization of Untrusted Data in Project Activerecord

Severity
9.8CRITICALNVD
EPSS
1.9%
top 16.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 5

Description

A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDactiverecord_project/activerecord6.0.06.0.5.1+3
RubyGemsactiverecord_project/activerecord7.0.07.0.3.1+3
Debianrubyonrails/rails< 2:6.1.6.1+dfsg-1+2
CVEListV5https/github.com_rails_rails7.0.3.1, 6.1.6.1, 6.0.5.1, 5.2.8.1

Patches

🔴Vulnerability Details

4
CVEList
CVE-2022-32224: A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 72022-12-05
OSV
CVE-2022-32224: A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 72022-12-05
GHSA
Active Record RCE bug with Serialized Columns2022-07-12
OSV
Active Record RCE bug with Serialized Columns2022-07-12

📋Vendor Advisories

2
Red Hat
activerecord: Possible RCE escalation bug with Serialized Columns in Active Record2022-07-12
Debian
CVE-2022-32224: rails - A possible escalation to RCE vulnerability exists when using YAML serialized col...2022
CVE-2022-32224 — Deserialization of Untrusted Data | cvebase