Joined: 12 May 2004
|Posted: Sat Jan 25, 2014 4:18 am Post subject: [ GLSA 201401-22 ] Active Record: SQL injection
|Gentoo Linux Security Advisory
Title: Active Record: SQL injection (GLSA 201401-22)
Date: January 21, 2014
A vulnerability in Active Record could allow a remote attacker to
inject SQL commands.
Active Record is a Ruby gem that allows database entries to be
manipulated as objects.
Vulnerable: < 2.3.14-r1
Unaffected: >= 2.3.14-r1
Architectures: All supported architectures
An Active Record method parameter can mistakenly be used as a scope.
A remote attacker could use specially crafted input to execute arbitrary
The vulnerability may be mitigated by converting the input to an
expected value. This is accomplished by changing instances of
‘Post.find_by_id(params[:id])’ in code using Active Record to
All Active Record users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-ruby/activerecord-2.3.14-r1"
Last edited by GLSA on Mon Feb 10, 2014 4:32 am; edited 2 times in total