Description
In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections. Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication. This is patched in wersion 0.13.0.
Published: 2020-03-13
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-0324 In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections. Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication. This is patched in wersion 0.13.0.
Github GHSA Github GHSA GHSA-2p5p-m353-833w Sort order SQL injection in Administrate
History

No history.

Subscriptions

Thoughtbot Administrate
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T08:22:09.077Z

Reserved: 2020-01-02T00:00:00.000Z

Link: CVE-2020-5257

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-03-13T21:15:12.190

Modified: 2024-11-21T05:33:46.790

Link: CVE-2020-5257

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses