{"id":"CVE-2008-4094","details":"Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.","aliases":["GHSA-xf96-32q2-9rw2"],"modified":"2026-04-10T03:40:09.256661Z","published":"2008-09-30T17:22:09Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/31875"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31909"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31910"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2562"},{"type":"EVIDENCE","url":"http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1"},{"type":"EVIDENCE","url":"http://secunia.com/advisories/31875"},{"type":"EVIDENCE","url":"http://secunia.com/advisories/31909"},{"type":"EVIDENCE","url":"http://secunia.com/advisories/31910"},{"type":"EVIDENCE","url":"http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/"},{"type":"FIX","url":"http://rails.lighthouseapp.com/projects/8994/tickets/288"},{"type":"FIX","url":"http://rails.lighthouseapp.com/projects/8994/tickets/964"},{"type":"WEB","url":"http://gist.github.com/8946"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2008/09/13/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2008/09/16/1"},{"type":"WEB","url":"http://www.securityfocus.com/bid/31176"},{"type":"WEB","url":"http://www.securitytracker.com/id?1020871"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45109"}],"schema_version":"1.7.5"}