CVE-2008-4094
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
30/09/2008
Last modified:
09/04/2025
Description
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1
- http://gist.github.com/8946
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://rails.lighthouseapp.com/projects/8994/tickets/288
- http://rails.lighthouseapp.com/projects/8994/tickets/964
- http://secunia.com/advisories/31875
- http://secunia.com/advisories/31909
- http://secunia.com/advisories/31910
- http://www.openwall.com/lists/oss-security/2008/09/13/2
- http://www.openwall.com/lists/oss-security/2008/09/16/1
- http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/
- http://www.securityfocus.com/bid/31176
- http://www.securitytracker.com/id?1020871=
- http://www.vupen.com/english/advisories/2008/2562
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45109
- http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1
- http://gist.github.com/8946
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://rails.lighthouseapp.com/projects/8994/tickets/288
- http://rails.lighthouseapp.com/projects/8994/tickets/964
- http://secunia.com/advisories/31875
- http://secunia.com/advisories/31909
- http://secunia.com/advisories/31910
- http://www.openwall.com/lists/oss-security/2008/09/13/2
- http://www.openwall.com/lists/oss-security/2008/09/16/1
- http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/
- http://www.securityfocus.com/bid/31176
- http://www.securitytracker.com/id?1020871=
- http://www.vupen.com/english/advisories/2008/2562
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45109



