GHSA-2p5p-m353-833w

Suggest an improvement
Source
https://github.com/advisories/GHSA-2p5p-m353-833w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/03/GHSA-2p5p-m353-833w/GHSA-2p5p-m353-833w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2p5p-m353-833w
Aliases
Published
2020-03-13T21:05:44Z
Modified
2023-11-08T04:03:53.213280Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Sort order SQL injection in Administrate
Details

In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the direction parameter and bypass ActiveRecord SQL protections.

Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication.

This is patched in wersion 0.13.0.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-03-13T21:05:20Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-943"
    ]
}
References

Affected packages

RubyGems / administrate

Package

Name
administrate
Purl
pkg:gem/administrate

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.13.0

Affected versions

0.*

0.0.2
0.0.3
0.0.4
0.0.6
0.0.7
0.0.8
0.0.9
0.0.10
0.0.11
0.0.12
0.1.0
0.1.1
0.1.2
0.1.3
0.1.4
0.1.5
0.2.0.rc1
0.2.0
0.2.1
0.2.2
0.3.0
0.4.0
0.5.0
0.6.0
0.7.0
0.8.0
0.8.1
0.9.0
0.10.0
0.11.0
0.12.0