CVE-2017-17917

** DISPUTED ** SQL injection vulnerability in the 'where' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:18

Type Values Removed Values Added
References () https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/ - Exploit, Third Party Advisory () https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/ - Exploit, Third Party Advisory

19 May 2023, 16:48

Type Values Removed Values Added
CPE cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

Information

Published : 2017-12-29 16:29

Updated : 2024-11-21 03:18


NVD link : CVE-2017-17917

Mitre link : CVE-2017-17917

CVE.ORG link : CVE-2017-17917


JSON object : View

Products Affected

rubyonrails

  • rails
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')