Vulnerability Description
The Authlogic gem for Ruby on Rails, when used with certain versions before 3.2.10, makes potentially unsafe find_by_id method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in secret_token.rb in an open-source product.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rubyonrails | Rails | < 3.2.10 |
Related Weaknesses (CWE)
References
- http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-hoExploit
- http://openwall.com/lists/oss-security/2013/01/03/12Mailing ListThird Party Advisory
- http://phenoelit.org/blog/archives/2012/12/21/let_me_github_that_for_you/index.hBroken LinkExploit
- http://www.securityfocus.com/bid/57084Broken LinkThird Party AdvisoryVDB Entry
- http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-hoExploit
- http://openwall.com/lists/oss-security/2013/01/03/12Mailing ListThird Party Advisory
- http://phenoelit.org/blog/archives/2012/12/21/let_me_github_that_for_you/index.hBroken LinkExploit
- http://www.securityfocus.com/bid/57084Broken LinkThird Party AdvisoryVDB Entry
FAQ
What is CVE-2012-6497?
CVE-2012-6497 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The Authlogic gem for Ruby on Rails, when used with certain versions before 3.2.10, makes potentially unsafe find_by_id method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL in...
How severe is CVE-2012-6497?
CVE-2012-6497 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6497?
Check the references section above for vendor advisories and patch information. Affected products include: Rubyonrails Rails.