7.5
CVE-2011-0448
- EPSS 0.69%
- Veröffentlicht 21.02.2011 18:00:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rubyonrails ≫ Rails Version3.0.0
Rubyonrails ≫ Rails Version3.0.0 Updatebeta
Rubyonrails ≫ Rails Version3.0.0 Updatebeta2
Rubyonrails ≫ Rails Version3.0.0 Updatebeta3
Rubyonrails ≫ Rails Version3.0.0 Updatebeta4
Rubyonrails ≫ Rails Version3.0.0 Updaterc
Rubyonrails ≫ Rails Version3.0.0 Updaterc2
Rubyonrails ≫ Rails Version3.0.1
Rubyonrails ≫ Rails Version3.0.1 Updatepre
Rubyonrails ≫ Rails Version3.0.2
Rubyonrails ≫ Rails Version3.0.2 Updatepre
Rubyonrails ≫ Rails Version3.0.3
Rubyonrails ≫ Rails Version3.0.4 Updaterc1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.69% | 0.694 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.