SQL injection - CVE-2012-6496
Published: January 4, 2013 / Updated: August 3, 2020
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
How to mitigate CVE-2012-6496
Sources
- http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/
- http://rhn.redhat.com/errata/RHSA-2013-0154.html
- http://rhn.redhat.com/errata/RHSA-2013-0155.html
- http://rhn.redhat.com/errata/RHSA-2013-0220.html
- http://rhn.redhat.com/errata/RHSA-2013-0544.html
- http://security.gentoo.org/glsa/glsa-201401-22.xml
- http://www.securityfocus.com/bid/57084
- https://bugzilla.redhat.com/show_bug.cgi?id=889649
- https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source&output=gplain