CVE-2022-35956

This Rails gem adds two methods to the ActiveRecord::Base class that allow you to update many records on a single database hit, using a case sql statement for it. Before version 0.1.3 `update_by_case` gem used custom sql strings, and it was not sanitized, making it vulnerable to sql injection. Upgrade to version >= 0.1.3 that uses `Arel` instead to construct the resulting sql statement, with sanitized sql.
Configurations

Configuration 1 (hide)

cpe:2.3:a:update_by_case_project:update_by_case:*:*:*:*:*:ruby:*:*

History

16 Aug 2022, 16:09

Type Values Removed Values Added
References (CONFIRM) https://github.com/camilova/activerecord-update-by-case/security/advisories/GHSA-33wh-w4m7-c6r8 - (CONFIRM) https://github.com/camilova/activerecord-update-by-case/security/advisories/GHSA-33wh-w4m7-c6r8 - Third Party Advisory
References (MISC) https://github.com/camilova/activerecord-update-by-case/releases/tag/v0.1.3-stable - (MISC) https://github.com/camilova/activerecord-update-by-case/releases/tag/v0.1.3-stable - Release Notes, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:update_by_case_project:update_by_case:*:*:*:*:*:ruby:*:*
First Time Update By Case Project
Update By Case Project update By Case

12 Aug 2022, 21:43

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-12 21:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-35956

Mitre link : CVE-2022-35956

CVE.ORG link : CVE-2022-35956


JSON object : View

Products Affected

update_by_case_project

  • update_by_case
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')