SQL Injection Affecting administrate package, versions <0.13.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (30th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-ADMINISTRATE-560317
  • published15 Mar 2020
  • disclosed13 Mar 2020
  • creditUnknown

Introduced: 13 Mar 2020

CVE-2020-5257  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade administrate to version 0.13.0 or higher.

Overview

administrate is a gem that is inspired by projects like Rails Admin and ActiveAdmin, but aims to provide a better user experience for site admins, and to be easier for developers to customize.

Affected versions of this package are vulnerable to SQL Injection. When sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the direction parameter and bypass ActiveRecord SQL protections. Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication.

References

CVSS Scores

version 3.1