CVE-2008-4094

Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
References
Link Resource
http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1 Exploit
http://gist.github.com/8946
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
http://rails.lighthouseapp.com/projects/8994/tickets/288 Patch
http://rails.lighthouseapp.com/projects/8994/tickets/964 Patch
http://secunia.com/advisories/31875 Exploit Vendor Advisory
http://secunia.com/advisories/31909 Exploit Vendor Advisory
http://secunia.com/advisories/31910 Exploit Vendor Advisory
http://www.openwall.com/lists/oss-security/2008/09/13/2
http://www.openwall.com/lists/oss-security/2008/09/16/1
http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/ Exploit
http://www.securityfocus.com/bid/31176
http://www.securitytracker.com/id?1020871
http://www.vupen.com/english/advisories/2008/2562 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45109
http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1 Exploit
http://gist.github.com/8946
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
http://rails.lighthouseapp.com/projects/8994/tickets/288 Patch
http://rails.lighthouseapp.com/projects/8994/tickets/964 Patch
http://secunia.com/advisories/31875 Exploit Vendor Advisory
http://secunia.com/advisories/31909 Exploit Vendor Advisory
http://secunia.com/advisories/31910 Exploit Vendor Advisory
http://www.openwall.com/lists/oss-security/2008/09/13/2
http://www.openwall.com/lists/oss-security/2008/09/16/1
http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/ Exploit
http://www.securityfocus.com/bid/31176
http://www.securitytracker.com/id?1020871
http://www.vupen.com/english/advisories/2008/2562 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45109
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.14.3:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:0.14.4:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:1.9.5:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:50

Type Values Removed Values Added
References () http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1 - Exploit () http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1 - Exploit
References () http://gist.github.com/8946 - () http://gist.github.com/8946 -
References () http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html -
References () http://rails.lighthouseapp.com/projects/8994/tickets/288 - Patch () http://rails.lighthouseapp.com/projects/8994/tickets/288 - Patch
References () http://rails.lighthouseapp.com/projects/8994/tickets/964 - Patch () http://rails.lighthouseapp.com/projects/8994/tickets/964 - Patch
References () http://secunia.com/advisories/31875 - Exploit, Vendor Advisory () http://secunia.com/advisories/31875 - Exploit, Vendor Advisory
References () http://secunia.com/advisories/31909 - Exploit, Vendor Advisory () http://secunia.com/advisories/31909 - Exploit, Vendor Advisory
References () http://secunia.com/advisories/31910 - Exploit, Vendor Advisory () http://secunia.com/advisories/31910 - Exploit, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2008/09/13/2 - () http://www.openwall.com/lists/oss-security/2008/09/13/2 -
References () http://www.openwall.com/lists/oss-security/2008/09/16/1 - () http://www.openwall.com/lists/oss-security/2008/09/16/1 -
References () http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/ - Exploit () http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/ - Exploit
References () http://www.securityfocus.com/bid/31176 - () http://www.securityfocus.com/bid/31176 -
References () http://www.securitytracker.com/id?1020871 - () http://www.securitytracker.com/id?1020871 -
References () http://www.vupen.com/english/advisories/2008/2562 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/2562 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45109 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/45109 -

Information

Published : 2008-09-30 17:22

Updated : 2024-11-21 00:50


NVD link : CVE-2008-4094

Mitre link : CVE-2008-4094

CVE.ORG link : CVE-2008-4094


JSON object : View

Products Affected

rubyonrails

  • ruby_on_rails
  • rails
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')