There is a SQL injection vulnerability in Active Record, in ALL versions. This vulnerability has been assigned the CVE
identifier CVE-2012-2695. Due to the way Active Record handles nested query parameters, an attacker can use a specially crafted request to inject
some forms of SQL into your application's SQL queries. Impacted code directly passes request params to the `where` method of an ActiveRecord class like this:
Post.where(:id => params[:id]).allAn attacker can make a request that causes `params[:id]` to return a specially crafted hash that will cause the WHERE clause of the SQL statement to query an arbitrary table with some value.
All users running an affected release should upgrade immediately. Please note, this vulnerability is a variant of
CVE-2012-2661, even if you upgraded to address that issue, you must take action again.
This issue can be mitigated by casting the parameter to an expected value. For example, change this:
Post.where(:id => params[:id]).allto this:
Post.where(:id => params[:id].to_s).all
- WordPress Plugin wp-autosuggest SQL Injection (0.24)
- WordPress Plugin WP-Predict 'predictId' Parameter Blind SQL Injection (1.0)
- WordPress Plugin WP-PostRatings '[ratings]' Shortcode SQL Injection (1.61)
- WordPress Plugin oQey Headers 'oqey_settings.php' SQL Injection (0.3)
- WordPress Plugin Calendar Event Multi View Multiple SQL Injection Vulnerabilities (1.1.7)