CVE-2014-3514
20.08.2014, 11:17
activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls.Enginsight
| Vendor | Product | Version |
|---|---|---|
| rubyonrails | rails | 4.0.0 |
| rubyonrails | rails | 4.0.0:beta |
| rubyonrails | rails | 4.0.0:rc1 |
| rubyonrails | rails | 4.0.0:rc2 |
| rubyonrails | rails | 4.0.1 |
| rubyonrails | rails | 4.0.1:rc1 |
| rubyonrails | rails | 4.0.1:rc2 |
| rubyonrails | rails | 4.0.1:rc3 |
| rubyonrails | rails | 4.0.1:rc4 |
| rubyonrails | rails | 4.0.2 |
| rubyonrails | rails | 4.0.3 |
| rubyonrails | rails | 4.0.4 |
| rubyonrails | rails | 4.0.5 |
| rubyonrails | rails | 4.0.6 |
| rubyonrails | rails | 4.0.6:rc1 |
| rubyonrails | rails | 4.0.6:rc2 |
| rubyonrails | rails | 4.0.6:rc3 |
| rubyonrails | rails | 4.0.7 |
| rubyonrails | rails | 4.0.8 |
| rubyonrails | rails | 4.1.0 |
| rubyonrails | rails | 4.1.0:beta1 |
| rubyonrails | rails | 4.1.1 |
| rubyonrails | rails | 4.1.2 |
| rubyonrails | rails | 4.1.2:rc1 |
| rubyonrails | rails | 4.1.2:rc2 |
| rubyonrails | rails | 4.1.2:rc3 |
| rubyonrails | rails | 4.1.3 |
| rubyonrails | rails | 4.1.4 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||
|---|---|---|---|---|---|---|---|
| rails |
| ||||||
| rails-3.2 |
| ||||||
| rails-4.0 |
| ||||||
| ruby-actionpack-2.3 |
| ||||||
| ruby-actionpack-3.2 |
| ||||||
| ruby-activerecord-2.3 |
| ||||||
| ruby-activerecord-3.2 |
| ||||||
| ruby-activesupport-2.3 |
| ||||||
| ruby-activesupport-3.2 |
| ||||||
| ruby-rails-2.3 |
| ||||||
| ruby-rails-3.2 |
|
Common Weakness Enumeration
References