svn commit: r301419 - head/security/vuxml

Steve Wills swills at FreeBSD.org
Tue Jul 24 00:56:08 UTC 2012


Author: swills
Date: Tue Jul 24 00:56:07 2012
New Revision: 301419
URL: http://svn.freebsd.org/changeset/ports/301419

Log:
  - Document activerecord security issues

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Jul 24 00:41:42 2012	(r301418)
+++ head/security/vuxml/vuln.xml	Tue Jul 24 00:56:07 2012	(r301419)
@@ -52,6 +52,43 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="748aa89f-d529-11e1-82ab-001fd0af1a4c">
+     <topic>rubygem-activerecord -- multiple vulnerabilities</topic>
+     <affects>
+        <package>
+           <name>databases/rubygem-activemodel</name>
+           <range><lt>3.2.4</lt></range>
+        </package>
+     </affects>
+     <description>
+        <body xmlns="http://www.w3.org/1999/xhtml">
+           <p>rubygem-activerecord -- multiple vulernabilities</p>
+           <blockquote>
+	      <p>Due to the way Active Record interprets parameters in
+		 combination with the way that Rack parses query parameters, it
+		 is possible for an attacker to issue unexpected database
+		 queries with "IS NULL" where clauses.  This issue does *not*
+		 let an attacker insert arbitrary values into an SQL query,
+		 however they can cause the query to check for NULL where most
+                 users wouldn't expect it.</p>
+	      <p>Due to the way Active Record handles nested query parameters,
+		 an attacker can use a specially crafted request to inject some
+                 forms of SQL into your application's SQL queries.</p>
+           </blockquote>
+        </body>
+     </description>
+     <references>
+        <cvename>CVE-2012-2660</cvename>
+        <cvename>CVE-2012-2661</cvename>
+        <url>https://groups.google.com/forum/?fromgroups#!topic/rubyonrails-security/8SA-M3as7A8</url>
+        <url>https://groups.google.com/forum/?fromgroups#!topic/rubyonrails-security/dUaiOOGWL1k</url>
+     </references>
+     <dates>
+        <discovery>2012-05-31</discovery>
+        <entry>2012-07-23</entry>
+     </dates>
+  </vuln>
+
   <vuln vid="bdab0acd-d4cd-11e1-8a1c-14dae9ebcf89">
     <topic>php -- potential overflow in _php_stream_scandir</topic>
     <affects>



More information about the svn-ports-all mailing list