{"id":"CVE-2012-6497","details":"The Authlogic gem for Ruby on Rails, when used with certain versions before 3.2.10, makes potentially unsafe find_by_id method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in secret_token.rb in an open-source product.","aliases":["GHSA-rx7j-mw4c-76g9"],"modified":"2026-04-10T03:42:35.555074Z","published":"2013-01-04T04:46:02Z","references":[{"type":"ADVISORY","url":"http://openwall.com/lists/oss-security/2013/01/03/12"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/57084"},{"type":"ARTICLE","url":"http://openwall.com/lists/oss-security/2013/01/03/12"},{"type":"ARTICLE","url":"http://phenoelit.org/blog/archives/2012/12/21/let_me_github_that_for_you/index.html"},{"type":"EVIDENCE","url":"http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/"},{"type":"EVIDENCE","url":"http://phenoelit.org/blog/archives/2012/12/21/let_me_github_that_for_you/index.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/57084"}],"schema_version":"1.7.5"}