CVE-2013-1854: Active Record Improper Input Validation
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.81963%
CWE
Published
10/24/2017
Updated
8/25/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
activerecord | rubygems | >= 2.3.0, < 2.3.18 | 2.3.18 |
activerecord | rubygems | >= 3.1.0, < 3.1.12 | 3.1.12 |
activerecord | rubygems | >= 3.2.0, < 3.2.13 | 3.2.13 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Active Record's handling of hash keys in query methods. The 'where' method accepts user-provided hashes and processes them using internal methods like sanitize_sql_hash_for_conditions, which historically converted string keys to symbols. Since Ruby symbols are not garbage collected, attackers could send crafted requests with unique hash keys to exhaust memory. The provided patches (e.g., 3-2-attribute_symbols.patch) likely modify these functions to prevent unsafe symbolization, confirming their role in the vulnerability.