CVE-2013-0155
Publication date 13 January 2013
Last updated 24 July 2024
Ubuntu priority
Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain ”[nil]” values, a related issue to CVE-2012-2660 and CVE-2012-2694.
Status
Package | Ubuntu Release | Status |
---|---|---|
rails | 13.10 saucy |
Not affected
|
13.04 raring |
Not affected
|
|
12.10 quantal |
Not affected
|
|
12.04 LTS precise |
Not affected
|
|
11.10 oneiric |
Not affected
|
|
10.04 LTS lucid | Ignored end of life | |
8.04 LTS hardy | Ignored end of life | |
ruby-actionpack-2.3 | 13.10 saucy |
Not affected
|
13.04 raring |
Not affected
|
|
12.10 quantal |
Not affected
|
|
12.04 LTS precise |
Not affected
|
|
11.10 oneiric |
Not affected
|
|
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release | |
ruby-actionpack-3.2 | 13.10 saucy |
Not affected
|
13.04 raring |
Not affected
|
|
12.10 quantal |
Fixed 3.2.6-4ubuntu0.1
|
|
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release | |
ruby-activerecord-2.3 | 13.10 saucy |
Fixed 2.3.14-4
|
13.04 raring |
Fixed 2.3.14-4
|
|
12.10 quantal |
Fixed 2.3.14-2ubuntu0.1
|
|
12.04 LTS precise |
Fixed 2.3.14-1ubuntu0.12.04.1
|
|
11.10 oneiric |
Fixed 2.3.14-1ubuntu0.11.10.1
|
|
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release | |
ruby-activerecord-3.2 | 13.10 saucy |
Not affected
|
13.04 raring |
Not affected
|
|
12.10 quantal |
Fixed 3.2.6-2ubuntu0.1
|
|
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release |