|Data Injection Vulnerability in Active Record (CVE-2014-0080)||Aaron Patterson||2/18/14 11:13 AM|
Data Injection Vulnerability in Active Record
There is a data injection vulnerability in Active Record. Specially
crafted strings can be used to save data in PostgreSQL array columns that may
not be intended. This vulnerability has been assigned the CVE identifier
Versions Affected: 4.0.x, 4.1.0.beta1
Not affected: 3.2.x and older
Fixed Versions: 4.0.3, 4.1.0.beta2
Specially crafted strings may be used to save data to array columns in
PostgreSQL databases. This vulnerability cannot be used to delete data or
execute arbitrary SQL statements, but *can* be used to add data that could
have an impact on the application (such as setting an admin flag). Only array
type columns in PostgreSQL are impacted.
All users running an affected release should either upgrade or use one of the
work arounds immediately.
The FIXED releases are available at the normal locations.
To work around this issue, apply this monkey patch:
alias :old_quote_and_escape :quote_and_escape
ARRAY_ESCAPE = "\\" * 2 * 2 # escape the backslash twice for PG arrays
when "NULL", Numeric
value = value.gsub(/\\/, ARRAY_ESCAPE)
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
* 4-1-beta-array_injection.patch - Patch for 4.1-beta series
* 4-0-array_injection.patch - Patch for 4.0 series
Thanks Godfrey Chan for reporting this!