Miggo Logo

CVE-2013-0155: Active Record allows bypassing of database-query restrictions

6.4

CVSS Score

Basic Information

EPSS Score
0.93217%
Published
10/24/2017
Updated
8/25/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
activerecordrubygems>= 3.0.0, < 3.0.193.0.19
activerecordrubygems>= 3.1.0, < 3.1.103.1.10
activerecordrubygems>= 3.2.0, < 3.2.113.2.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from how Active Record processes parameters for query generation. Key functions like where and find_by handle user input without properly sanitizing arrays containing nil values. The PredicateBuilder's build_from_hash method is directly responsible for converting parameters into SQL conditions, and its failure to handle [nil] arrays results in unsafe queries. These functions appear in stack traces when processing malicious parameters, making them critical runtime indicators.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Ru*y on R*ils *.*.x ***or* *.*.**, *.*.x ***or* *.*.**, *n* *.*.x ***or* *.*.** *o*s not prop*rly *onsi**r *i***r*n**s in p*r*m*t*r **n*lin* **tw**n t** **tiv* R**or* *ompon*nt *n* t** JSON impl*m*nt*tion, w*i** *llows r*mot* *tt**k*rs to *yp*ss int*

Reasoning

T** vuln*r**ility st*ms *rom *ow **tiv* R**or* pro**ss*s p*r*m*t*rs *or qu*ry **n*r*tion. K*y *un*tions lik* `w**r*` *n* `*in*_*y` **n*l* us*r input wit*out prop*rly s*nitizin* *rr*ys *ont*inin* nil v*lu*s. T** Pr**i**t**uil**r's `*uil*_*rom_**s*` m*
CVE-2013-0155: Rails Active Record Query Bypass | Miggo