CVE-2022-32224
05.12.2022, 22:15
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.Enginsight
| Vendor | Product | Version |
|---|---|---|
| activerecord_project | activerecord | 𝑥 < 5.2.8.1 |
| activerecord_project | activerecord | 6.0.0 ≤ 𝑥 < 6.0.5.1 |
| activerecord_project | activerecord | 6.1.0 ≤ 𝑥 < 6.1.6.1 |
| activerecord_project | activerecord | 7.0.0 ≤ 𝑥 < 7.0.3.1 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| rails |
| ||||||||||||||||||
| rails-4.0 |
| ||||||||||||||||||
| ruby-actionpack-3.2 |
| ||||||||||||||||||
| ruby-activemodel-3.2 |
| ||||||||||||||||||
| ruby-activerecord-3.2 |
| ||||||||||||||||||
| ruby-activesupport-3.2 |
| ||||||||||||||||||
| ruby-rails-3.2 |
|
Common Weakness Enumeration