Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zM3doLXc0bTctYzZyOM4AAt8F
update_by_case before 0.1.3 can be vulnerable to sql injection
Before version 0.1.3 update_by_case
gem used custom sql strings, and it was not sanitized, making it vulnerable to sql injection. Upgrade to version >= 0.1.3 that uses Arel
instead to construct the resulting sql statement, with sanitized sql.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zM3doLXc0bTctYzZyOM4AAt8F
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: about 1 year ago
CVSS Score: 5.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
Identifiers: GHSA-33wh-w4m7-c6r8, CVE-2022-35956
References:
- https://github.com/camilova/activerecord-update-by-case/security/advisories/GHSA-33wh-w4m7-c6r8
- https://nvd.nist.gov/vuln/detail/CVE-2022-35956
- https://github.com/camilova/activerecord-update-by-case/releases/tag/v0.1.3-stable
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/update_by_case/CVE-2022-35956.yml
- https://github.com/advisories/GHSA-33wh-w4m7-c6r8
Blast Radius: 0.0
Affected Packages
rubygems:update_by_case
Dependent packages: 0Dependent repositories: 1
Downloads: 1,835 total
Affected Version Ranges: < 0.1.3
Fixed in: 0.1.3
All affected versions: 0.1.0, 0.1.1, 0.1.2
All unaffected versions: 0.1.3, 0.1.4