UBUNTU-CVE-2013-6417

Source
https://ubuntu.com/security/CVE-2013-6417
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-6417.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2013-6417
Upstream
  • CVE-2013-6417
Withdrawn
2025-07-18T16:42:56Z
Published
2013-12-07T00:55:00Z
Modified
2025-07-16T08:10:49.351775Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.

References

Affected packages

Ubuntu:14.04:LTS / ruby-actionpack-3.2

Package

Name
ruby-actionpack-3.2
Purl
pkg:deb/ubuntu/ruby-actionpack-3.2@3.2.16-3?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.16-3

Affected versions

3.*
3.2.13-7

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "ruby-actionpack-3.2",
            "binary_version": "3.2.16-3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-6417.json"