cve/2012/CVE-2012-2661.md
2024-08-05 18:41:32 +00:00

21 lines
1.0 KiB
Markdown

### [CVE-2012-2661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2661)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Blackyguy/-CVE-2012-2661-ActiveRecord-SQL-injection-
- https://github.com/ehayushpathak/WebApp-Hacking
- https://github.com/paulveillard/cybersecurity-infosec
- https://github.com/r4x0r1337/-CVE-2012-2661-ActiveRecord-SQL-injection-