CVE-2020-5257
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
13/03/2020
Last modified:
18/03/2020
Description
In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections. Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication. This is patched in wersion 0.13.0.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
5.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:thoughtbot:administrate:*:*:*:*:*:ruby:*:* | 0.13.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



