Bug 1365017 (CVE-2016-6317)
Summary: | CVE-2016-6317 rubygem-activerecord: unsafe query generation in Active Record | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Martin Prpič <mprpic> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | hhorak, jorton, security-response-team | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | rubygem-activerecord 4.2.7.1 | Doc Type: | If docs needed, set a value | ||||
Doc Text: |
A flaw was found in the way Active Record handled certain special values in dynamic finders and relations. If a Ruby on Rails application performed JSON parameter parsing, a remote attacker could possibly manipulate search conditions in SQL queries generated by the application.
|
Story Points: | --- | ||||
Clone Of: | Environment: | ||||||
Last Closed: | 2016-09-13 11:18:58 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1366479, 1367060, 1367061 | ||||||
Bug Blocks: | 1365019 | ||||||
Attachments: |
|
Description
Martin Prpič
2016-08-08 11:20:35 UTC
Acknowledgments: Name: the Ruby on Rails project Upstream: joernchen (Phenoelit) Created attachment 1188641 [details]
4-2-unsafe-query-generation.patch
Created rubygem-activerecord tracking bugs for this issue: Affects: fedora-all [bug 1366479] External References: https://groups.google.com/forum/#!msg/rubyonrails-security/rgO20zYW33s/gmamLa-wDAAJ Upstream commit: 4.2: https://github.com/rails/rails/commit/93ab8c2638a5a3aa3e63915a4c646effefbae0ba This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS Via RHSA-2016:1855 https://rhn.redhat.com/errata/RHSA-2016-1855.html |