GHSA-9rf5-jm6f-2fmm

Suggest an improvement
Source
https://github.com/advisories/GHSA-9rf5-jm6f-2fmm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-9rf5-jm6f-2fmm/GHSA-9rf5-jm6f-2fmm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9rf5-jm6f-2fmm
Aliases
Published
2017-10-24T18:33:36Z
Modified
2024-11-29T05:41:44.037978Z
Summary
Active Record subject to strong parameters protection bypass
Details

activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls.

Database specific
{
    "nvd_published_at": "2014-08-20T11:17:14Z",
    "cwe_ids": [
        "CWE-284"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:29:34Z"
}
References

Affected packages

RubyGems / activerecord

Package

Name
activerecord
Purl
pkg:gem/activerecord

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0
Fixed
4.0.9

Affected versions

4.*

4.0.0
4.0.1.rc1
4.0.1.rc2
4.0.1.rc3
4.0.1.rc4
4.0.1
4.0.2
4.0.3
4.0.4.rc1
4.0.4
4.0.5
4.0.6.rc1
4.0.6.rc2
4.0.6.rc3
4.0.6
4.0.7
4.0.8

RubyGems / activerecord

Package

Name
activerecord
Purl
pkg:gem/activerecord

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.1.0
Fixed
4.1.5

Affected versions

4.*

4.1.0
4.1.1
4.1.2.rc1
4.1.2.rc2
4.1.2.rc3
4.1.2
4.1.3
4.1.4