SQL injection - CVE-2011-2930
Published: August 29, 2011 / Updated: August 3, 2020
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
How to mitigate CVE-2011-2930
Sources
- http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
- http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6
- http://www.debian.org/security/2011/dsa-2301
- http://www.openwall.com/lists/oss-security/2011/08/17/1
- http://www.openwall.com/lists/oss-security/2011/08/19/11
- http://www.openwall.com/lists/oss-security/2011/08/20/1
- http://www.openwall.com/lists/oss-security/2011/08/22/13
- http://www.openwall.com/lists/oss-security/2011/08/22/14
- http://www.openwall.com/lists/oss-security/2011/08/22/5
- https://bugzilla.redhat.com/show_bug.cgi?id=731438
- https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85