CVE-2020-5257

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-5257
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-5257.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-5257
Aliases
Related
Published
2020-03-13T21:15:12Z
Modified
2025-07-01T23:54:12.597122Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the direction parameter and bypass ActiveRecord SQL protections. Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication. This is patched in wersion 0.13.0.

References

Affected packages

Git / github.com/thoughtbot/administrate

Affected ranges

Type
GIT
Repo
https://github.com/thoughtbot/administrate
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.10.0
v0.11.0
v0.12.0
v0.2.0
v0.2.1
v0.2.2
v0.3.0
v0.4.0
v0.5.0
v0.6.0
v0.7.0
v0.8.0
v0.8.1
v0.9.0