The following flaw was found in Active Record: Due to the way Active Record interprets parameters in combination with the way that JSON parameters are parsed, it is possible for an attacker to issue unexpected database queries with "IS NULL" or empty where clauses. This issue does *not* let an attacker insert arbitrary values into an SQL query, however they can cause the query to check for NULL or eliminate a WHERE clause when most users wouldn't expect it. This issue only affects the 4.2.x versions of Active Record.
Acknowledgments: Name: the Ruby on Rails project Upstream: joernchen (Phenoelit)
Created attachment 1188641 [details] 4-2-unsafe-query-generation.patch
Created rubygem-activerecord tracking bugs for this issue: Affects: fedora-all [bug 1366479]
External References: https://groups.google.com/forum/#!msg/rubyonrails-security/rgO20zYW33s/gmamLa-wDAAJ
Upstream commit: 4.2: https://github.com/rails/rails/commit/93ab8c2638a5a3aa3e63915a4c646effefbae0ba
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS Via RHSA-2016:1855 https://rhn.redhat.com/errata/RHSA-2016-1855.html