Summary
This host is running Ruby on Rails and is prone to security bypass and SQL injection vulnerabilities.
Impact
Successful exploitation will allow attackers to bypass certain security restrictions and conduct SQL injection attacks.
Impact Level: Application
Solution
Upgrade to Ruby on Rails version 3.0.4 or later.
For updates refer to http://rubyonrails.org/download
Insight
- The filtering code does not properly work for case insensitive file systems, which can be exploited to bypass the filter by varying the case in certain action parameters.
- Input passed to the 'limit()' function is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Affected
Ruby on Rails versions 3.x before 3.0.4
References
Severity
Classification
-
CVE CVE-2011-0448, CVE-2011-0449 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities