CVE-2013-6417: actionpack allows bypass of database-query restrictions
6.4
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.65522%
CWE
Published
10/24/2017
Updated
8/25/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
actionpack | rubygems | >= 3.0.0, < 3.2.16 | 3.2.16 |
actionpack | rubygems | >= 4.0.0, < 4.0.2 | 4.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from how parameters are merged from Rack middleware into Rails' parameter handling. ActionDispatch::Request#parameters
is the central method responsible for collecting parameters from various parsers. The incomplete fix for CVE-2013-0155 left a gap where middleware could inject unvalidated parameters (e.g., via JSON parsing) that bypass Active Record
's query restrictions. This method's aggregation logic failed to properly sanitize parameters from non-Rails parsers, enabling the bypass.