cvelist/2023/22xxx/CVE-2023-22794.json

67 lines
2.4 KiB
JSON
Raw Normal View History

2023-01-06 16:00:37 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22794",
2023-02-09 20:00:43 +00:00
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "https://github.com/rails/rails",
"version": {
"version_data": [
{
"version_value": "6.0.6.1, 6.1.7.1, 7.0.4.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL Injection (CWE-89)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117",
"url": "https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117"
2023-03-14 08:00:33 +00:00
},
{
"refsource": "DEBIAN",
"name": "DSA-5372",
"url": "https://www.debian.org/security/2023/dsa-5372"
2023-02-09 20:00:43 +00:00
}
]
2023-01-06 16:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-02-09 20:00:43 +00:00
"value": "A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 related to the sanitization of comments. If malicious user input is passed to either the `annotate` query method, the `optimizer_hints` query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database withinsufficient sanitization and be able to inject SQL outside of the comment."
2023-01-06 16:00:37 +00:00
}
]
}
}