NA

CVE-2012-5664

Published: 26/12/2012 Updated: 07/11/2023

Vulnerability Summary

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6496, CVE-2012-6497. Reason: this candidate was intended for one issue, but the candidate was publicly used to label concerns about multiple products. Notes: All CVE users should consult CVE-2012-6496 and CVE-2012-6497 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage.

Vulnerability Trend

Github Repositories

Gestore di fatturazione per partite iva

Rubyfatt rubyfattkreationsit/ Rubyfatt è un'applicazione open-source multiutente per la gestione delle partite iva Gestisce preventivi, fatture, notule e progetti di notula, pagamenti, regimi di tassazione completamente configurabili, fatture ricorrenti Ha un piccolo sistema di report con statistiche e grafici sugli incassi, le notule da incassare, ecc

Demo app showing how the Rails CVE-2013-5664 vulnerability works.

Rails CVE-2012-5664 vulnerability demo This demonstration application shows how the Rails CVE-2013-5664 vulnerability works More information: blogphusionnl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts

Recent Articles

Ruby on Rails has SQL injection vuln
The Register • Richard Chirgwin • 03 Jan 2013

Get patching

The maintainers of Ruby on Rails are warning of an SQL injection vulnerability which affects all versions of the popular Web framework. They advise that users should immediately apply an upgrade available here. Designated CVE-2012-5664, the maintainers explain the bug this way: “Due to the way dynamic finders in Active Record extract options from method parameters, a method parameter can mistakenly be used as a scope. Carefully crafted requests can use the scope to inject arbitrary SQL.” New...