Vulnerabilidad en Ruby on Rails (CVE-2008-4094)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-89
Neutralización incorrecta de elementos especiales usados en un comando SQL (Inyección SQL)
Fecha de publicación:
30/09/2008
Última modificación:
09/04/2025
Descripción
"Múltiples vulnerabilidades de inyección SQL en Ruby on Rails anterior a versión 2.1.1, permiten a los atacantes remotos ejecutar comandos SQL arbitrarios por medio de los parámetros (1): limit y (2): offset, relacionados con ActiveRecord, ActiveSupport, ActiveResource, ActionPack y ActionMailer.
Impacto
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1
- http://gist.github.com/8946
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://rails.lighthouseapp.com/projects/8994/tickets/288
- http://rails.lighthouseapp.com/projects/8994/tickets/964
- http://secunia.com/advisories/31875
- http://secunia.com/advisories/31909
- http://secunia.com/advisories/31910
- http://www.openwall.com/lists/oss-security/2008/09/13/2
- http://www.openwall.com/lists/oss-security/2008/09/16/1
- http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/
- http://www.securityfocus.com/bid/31176
- http://www.securitytracker.com/id?1020871=
- http://www.vupen.com/english/advisories/2008/2562
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45109
- http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1
- http://gist.github.com/8946
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://rails.lighthouseapp.com/projects/8994/tickets/288
- http://rails.lighthouseapp.com/projects/8994/tickets/964
- http://secunia.com/advisories/31875
- http://secunia.com/advisories/31909
- http://secunia.com/advisories/31910
- http://www.openwall.com/lists/oss-security/2008/09/13/2
- http://www.openwall.com/lists/oss-security/2008/09/16/1
- http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/
- http://www.securityfocus.com/bid/31176
- http://www.securitytracker.com/id?1020871=
- http://www.vupen.com/english/advisories/2008/2562
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45109



