发布时间: 2023年3月1日
修改时间: 2024年10月31日
A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 related to the sanitization of comments. If malicious user input is passed to either the `annotate` query method, the `optimizer_hints` query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database withinsufficient sanitization and be able to inject SQL outside of the comment.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Network | Network |
CVSS评分 | 8.8 | 8.8 |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
Scope | Unchanged | Unchanged |
Integrity | High | High |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1131 | rubygem-activerecord security update | 2023年3月1日 |
KylinSec-SA-2023-2100 | rubygem-activerecord security update | 2023年3月1日 |
产品 | 包 | 状态 |
---|---|---|
KY3.5.2 | rubygem-activerecord | Fixed |
KY3.5.1 | rubygem-activerecord | Fixed |