Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)
The prior fix to CVE-2013-0155 was incomplete and the use of common
3rd party libraries can accidentally circumvent the protection. Due
to the way that Rack::Request and Rails::Request interact, it is
possible for a 3rd party or custom rack middleware to parse the
parameters insecurely and store them in the same key that Rails uses
for its own parameters. In the event that happens the application
will receive unsafe parameters and could be vulnerable to the earlier
Am I vulnerable?
The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.
Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.Sign up for monitoring
Affected package information
|Package||Patched in||Unaffected in|