CVE-2012-2694: actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.54906%
CWE
-
Published
10/24/2017
Updated
1/20/2025
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
actionpack | rubygems | >= 3.1.0, < 3.1.6 | 3.1.6 |
actionpack | rubygems | >= 3.2.0, < 3.2.6 | 3.2.6 |
actionpack | rubygems | >= 3.0.13, < 3.0.14 | 3.0.14 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the order of operations in the deep_munge method. Pre-patch, it processed nested structures first and then removed [nil] values. This allowed arrays with nil elements to persist during parameter parsing. The fix (2f3bc04) moved the [nil] key removal to the start of the method and added v.compact! to sanitize arrays, directly addressing the bypass. The CVE description explicitly references parameter handling discrepancies between Rack and Active Record, which this function mediates.