Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2011/08/17/1 | mailing list patch |
https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85 | patch |
http://www.openwall.com/lists/oss-security/2011/08/22/13 | mailing list patch |
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2011/08/19/11 | mailing list patch |
http://www.debian.org/security/2011/dsa-2301 | vendor advisory |
http://www.openwall.com/lists/oss-security/2011/08/20/1 | mailing list patch |
http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain | mailing list patch |
http://www.openwall.com/lists/oss-security/2011/08/22/14 | mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=731438 | patch |
http://www.openwall.com/lists/oss-security/2011/08/22/5 | mailing list patch |
http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6 | patch |