Permissions, Privileges, and Access Controls in Action Mailer - CVE-2013-6417

 

Permissions, Privileges, and Access Controls in Action Mailer - CVE-2013-6417

Published: December 7, 2013 / Updated: July 28, 2020


Vulnerability identifier: #VU32545
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2013-6417
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Rails
Affected software:
Action Mailer

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.


How to mitigate CVE-2013-6417

Install update from vendor's website.

Sources