A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 related to the sanitization of comments. If malicious user input is passed to either the `annotate` query method, the `optimizer_hints` query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database withinsufficient sanitization and be able to inject SQL outside of the comment.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 07:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117 - Exploit, Patch, Vendor Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20240202-0008/ - | |
| References | () https://www.debian.org/security/2023/dsa-5372 - | 
02 Feb 2024, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
Information
                Published : 2023-02-09 20:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22794
Mitre link : CVE-2023-22794
CVE.ORG link : CVE-2023-22794
JSON object : View
Products Affected
                activerecord_project
- activerecord
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
