Vulnerability Name:

CVE-2012-6496 (CCN-81004)

Assigned:2012-12-26
Published:2012-12-26
Updated:2019-08-08
Summary:SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-89
Vulnerability Consequences:Gain Access
References:Source: MISC
Type: UNKNOWN
http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/

Source: CCN
Type: Phusion Corporate Blog, January 3rd, 2013
Rails SQL injection vulnerability: hold your horses, here are the facts

Source: MITRE
Type: CNA
CVE-2012-6496

Source: CCN
Type: RHSA-2013-0154
Critical: Ruby on Rails security update

Source: REDHAT
Type: UNKNOWN
RHSA-2013:0154

Source: CCN
Type: RHSA-2013-0155
Critical: Ruby on Rails security update

Source: REDHAT
Type: UNKNOWN
RHSA-2013:0155

Source: CCN
Type: RHSA-2013-0220
Important: Red Hat OpenShift Enterprise 1.1 update

Source: REDHAT
Type: UNKNOWN
RHSA-2013:0220

Source: REDHAT
Type: UNKNOWN
RHSA-2013:0544

Source: CCN
Type: Ruby on Rails Web Site
Ruby on Rails

Source: GENTOO
Type: UNKNOWN
GLSA-201401-22

Source: CCN
Type: IBM Security Bulletin 1626255
IBM Security Network Intrusion Prevention System can be affected by vulnerabilities in Ruby on Rails (CVE-2012-2660, CVE-2012-2694, CVE-2013-0156, CVE-2012-6496, CVE-2012-3424, and CVE-2012-2695)

Source: CCN
Type: IBM Security Bulletin 1626515
IBM Security Network Protection can be affected by vulnerabilities in Ruby on Rails (CVE-2012-2660, CVE-2012-2694, CVE-2013-0155, CVE-2013-0156, CVE-2012-6496, CVE-2012-3424, and CVE-2012-2695)

Source: DEBIAN
Type: DSA-2597
rails -- input validation error

Source: BID
Type: UNKNOWN
57084

Source: CCN
Type: BID-57084
Ruby on Rails Multiple SQL Injection Vulnerabilities

Source: CCN
Type: Red Hat Bugzilla Bug 889649
Bug 889649 - (CVE-2012-5664, CVE-2012-6496) CVE-2012-6496 rubygem-activerecord: find_by_* SQL Injection

Source: CONFIRM
Type: Exploit, Patch
https://bugzilla.redhat.com/show_bug.cgi?id=889649

Source: XF
Type: UNKNOWN
rubyonrails-sql-command-exec(81004)

Source: MLIST
Type: UNKNOWN
[rubyonrails-security] 20130102 SQL Injection Vulnerability in Ruby on Rails (CVE-2012-5664)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:* (Version <= 3.0.17)

  • Configuration 3:
  • cpe:/a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:18552
    P
    DSA-2597-1 rails - input validation error
    2014-06-23
    oval:com.ubuntu.precise:def:20126496000
    V
    CVE-2012-6496 on Ubuntu 12.04 LTS (precise) - medium.
    2013-01-03
    oval:com.ubuntu.xenial:def:201264960000000
    V
    CVE-2012-6496 on Ubuntu 16.04 LTS (xenial) - medium.
    2013-01-03
    oval:com.ubuntu.trusty:def:20126496000
    V
    CVE-2012-6496 on Ubuntu 14.04 LTS (trusty) - medium.
    2013-01-03
    oval:com.ubuntu.xenial:def:20126496000
    V
    CVE-2012-6496 on Ubuntu 16.04 LTS (xenial) - medium.
    2013-01-03
    BACK
    rubyonrails rails 3.1.0
    rubyonrails rails 3.1.0 beta1
    rubyonrails rails 3.1.0 rc1
    rubyonrails rails 3.1.0 rc2
    rubyonrails rails 3.1.0 rc3
    rubyonrails rails 3.1.0 rc4
    rubyonrails rails 3.1.0 rc5
    rubyonrails rails 3.1.0 rc6
    rubyonrails rails 3.1.0 rc7
    rubyonrails rails 3.1.0 rc8
    rubyonrails rails 3.1.1
    rubyonrails rails 3.1.1 rc1
    rubyonrails rails 3.1.1 rc2
    rubyonrails rails 3.1.1 rc3
    rubyonrails rails 3.1.2
    rubyonrails rails 3.1.2 rc1
    rubyonrails rails 3.1.2 rc2
    rubyonrails rails 3.1.3
    rubyonrails rails 3.1.4
    rubyonrails rails 3.1.4 rc1
    rubyonrails rails 3.1.5
    rubyonrails rails 3.1.5 rc1
    rubyonrails rails 3.1.6
    rubyonrails rails 3.1.7
    rubyonrails rails 3.1.8
    rubyonrails rails 3.0.0
    rubyonrails rails 3.0.0 beta
    rubyonrails rails 3.0.0 beta2
    rubyonrails rails 3.0.0 beta3
    rubyonrails rails 3.0.0 beta4
    rubyonrails rails 3.0.0 rc
    rubyonrails rails 3.0.0 rc2
    rubyonrails rails 3.0.1
    rubyonrails rails 3.0.1 pre
    rubyonrails rails 3.0.2
    rubyonrails rails 3.0.2 pre
    rubyonrails rails 3.0.3
    rubyonrails rails 3.0.4 rc1
    rubyonrails rails 3.0.5
    rubyonrails rails 3.0.5 rc1
    rubyonrails rails 3.0.6
    rubyonrails rails 3.0.6 rc1
    rubyonrails rails 3.0.6 rc2
    rubyonrails rails 3.0.7
    rubyonrails rails 3.0.7 rc1
    rubyonrails rails 3.0.7 rc2
    rubyonrails rails 3.0.8
    rubyonrails rails 3.0.8 rc1
    rubyonrails rails 3.0.8 rc2
    rubyonrails rails 3.0.8 rc3
    rubyonrails rails 3.0.8 rc4
    rubyonrails rails 3.0.9
    rubyonrails rails 3.0.9 rc1
    rubyonrails rails 3.0.9 rc2
    rubyonrails rails 3.0.9 rc3
    rubyonrails rails 3.0.9 rc4
    rubyonrails rails 3.0.9 rc5
    rubyonrails rails 3.0.10
    rubyonrails rails 3.0.10 rc1
    rubyonrails rails 3.0.11
    rubyonrails rails 3.0.12
    rubyonrails rails 3.0.12 rc1
    rubyonrails rails 3.0.13
    rubyonrails rails 3.0.13 rc1
    rubyonrails rails 3.0.14
    rubyonrails rails 3.0.16
    rubyonrails ruby on rails 3.0.4
    rubyonrails ruby on rails *
    rubyonrails rails 3.2.0
    rubyonrails rails 3.2.0 rc1
    rubyonrails rails 3.2.0 rc2
    rubyonrails rails 3.2.1
    rubyonrails rails 3.2.2
    rubyonrails rails 3.2.2 rc1
    rubyonrails rails 3.2.3
    rubyonrails rails 3.2.3 rc1
    rubyonrails rails 3.2.3 rc2
    rubyonrails rails 3.2.4
    rubyonrails rails 3.2.4 rc1
    rubyonrails rails 3.2.5
    rubyonrails rails 3.2.6
    rubyonrails rails 3.2.7
    rubyonrails rails 3.2.8
    rubyonrails rails 3.2.9