Plattform
ruby
Komponente
activerecord
Behoben in
3.0.4
CVE-2011-0448 describes a SQL Injection vulnerability discovered in Ruby on Rails versions 3.0.x prior to 3.0.4. This flaw allows attackers to manipulate SQL queries by providing non-integer values to the limit function, potentially leading to unauthorized data access or modification. The vulnerability was publicly disclosed in 2017 and a patch is available in version 3.0.4.
Successful exploitation of CVE-2011-0448 could allow an attacker to bypass application security controls and directly interact with the underlying database. This could result in the unauthorized retrieval, modification, or deletion of sensitive data, including user credentials, financial information, or application configuration details. Depending on the database schema and application logic, an attacker might also be able to execute arbitrary commands on the database server, potentially leading to a complete compromise of the system. The impact is amplified in environments where the application handles sensitive data or is integrated with other critical systems.
CVE-2011-0448 has been publicly disclosed and a proof-of-concept may be available. While active exploitation is not widely reported, the vulnerability's ease of exploitation and the potential impact make it a persistent risk. It was added to the NVD database on 2017-10-24. The vulnerability's age means that many applications may still be running vulnerable versions, making it a target for opportunistic attackers.
Applications still running Ruby on Rails versions 3.0.x prior to 3.0.4 are at risk. This includes legacy applications, applications in development environments that haven't been updated, and potentially shared hosting environments where users have limited control over the application's version.
• ruby / server:
find /var/www/your_rails_app -name '*.rb' -print0 | xargs -0 grep -i 'limit\(' -n• generic web:
curl -I http://your-rails-app.com/some/endpoint?limit=a | grep 'Content-Type:'discovery
disclosure
Exploit-Status
EPSS
0.69% (72% Perzentil)
The primary mitigation for CVE-2011-0448 is to upgrade to Ruby on Rails version 3.0.4 or later. If upgrading is not immediately feasible, consider implementing input validation on the limit function to ensure that only integer values are accepted. While not a complete solution, this can reduce the attack surface. Web application firewalls (WAFs) configured to detect and block SQL injection attempts can also provide a layer of defense. Thoroughly review and sanitize all user inputs to prevent malicious code from reaching the database.
Kein offizieller Patch verfügbar. Prüfe auf Workarounds oder überwache auf Updates.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2011-0448 is a SQL Injection vulnerability affecting Ruby on Rails versions 3.0.x before 3.0.4. It allows attackers to inject malicious SQL code through the 'limit' function.
You are affected if you are using Ruby on Rails versions 3.0.x prior to 3.0.4. Check your application's version to determine if you are vulnerable.
Upgrade to Ruby on Rails version 3.0.4 or later to resolve this vulnerability. Input validation can be used as a temporary workaround.
While widespread active exploitation is not confirmed, the vulnerability's ease of exploitation makes it a potential target for attackers. Its age means many systems may still be vulnerable.
Refer to the Ruby on Rails security advisories and the NVD database for more information: https://nvd.nist.gov/vuln/detail/CVE-2011-0448
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Gemfile.lock-Datei hoch und wir sagen dir sofort, ob du betroffen bist.