Sort order SQL injection via `direction` parameter in administrate
Published: March 14, 2020
SECURITY IDENTIFIERS
- CVE: CVE-2020-5257 (NVD)
- GHSA: GHSA-2p5p-m353-833w
GEM
SEVERITY
CVSS v3.x: 7.7 (High)
PATCHED VERSIONS
>= 0.13.0
DESCRIPTION
In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query.
This could present a SQL injection if the attacker were able to modify the direction parameter and bypass ActiveRecord SQL protections.
Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which should generally be behind authentication.
