Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Jul 2012 00:56:07 +0000 (UTC)
From:      Steve Wills <swills@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r301419 - head/security/vuxml
Message-ID:  <201207240056.q6O0u73B068596@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: swills
Date: Tue Jul 24 00:56:07 2012
New Revision: 301419
URL: http://svn.freebsd.org/changeset/ports/301419

Log:
  - Document activerecord security issues

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Jul 24 00:41:42 2012	(r301418)
+++ head/security/vuxml/vuln.xml	Tue Jul 24 00:56:07 2012	(r301419)
@@ -52,6 +52,43 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="748aa89f-d529-11e1-82ab-001fd0af1a4c">
+     <topic>rubygem-activerecord -- multiple vulnerabilities</topic>
+     <affects>
+        <package>
+           <name>databases/rubygem-activemodel</name>
+           <range><lt>3.2.4</lt></range>
+        </package>
+     </affects>
+     <description>
+        <body xmlns="http://www.w3.org/1999/xhtml">;
+           <p>rubygem-activerecord -- multiple vulernabilities</p>
+           <blockquote>
+	      <p>Due to the way Active Record interprets parameters in
+		 combination with the way that Rack parses query parameters, it
+		 is possible for an attacker to issue unexpected database
+		 queries with "IS NULL" where clauses.  This issue does *not*
+		 let an attacker insert arbitrary values into an SQL query,
+		 however they can cause the query to check for NULL where most
+                 users wouldn't expect it.</p>
+	      <p>Due to the way Active Record handles nested query parameters,
+		 an attacker can use a specially crafted request to inject some
+                 forms of SQL into your application's SQL queries.</p>
+           </blockquote>
+        </body>
+     </description>
+     <references>
+        <cvename>CVE-2012-2660</cvename>
+        <cvename>CVE-2012-2661</cvename>
+        <url>https://groups.google.com/forum/?fromgroups#!topic/rubyonrails-security/8SA-M3as7A8</url>;
+        <url>https://groups.google.com/forum/?fromgroups#!topic/rubyonrails-security/dUaiOOGWL1k</url>;
+     </references>
+     <dates>
+        <discovery>2012-05-31</discovery>
+        <entry>2012-07-23</entry>
+     </dates>
+  </vuln>
+
   <vuln vid="bdab0acd-d4cd-11e1-8a1c-14dae9ebcf89">
     <topic>php -- potential overflow in _php_stream_scandir</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201207240056.q6O0u73B068596>