| ID |
CVE-2020-5257
|
| Sažetak |
In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections. Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication. This is patched in wersion 0.13.0. |
| Reference |
|
| CVSS |
| Base: | 5.5 |
| Impact: | 4.9 |
| Exploitability: | 8.0 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
LOW |
SINGLE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| PARTIAL |
PARTIAL |
NONE |
|
| CVSS vektor |
AV:N/AC:L/Au:S/C:P/I:P/A:N |
| Zadnje važnije ažuriranje |
18-03-2020 - 16:05 |
| Objavljeno |
13-03-2020 - 21:15 |