{"id":"CVE-2017-17917","details":"SQL injection vulnerability in the 'where' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input","modified":"2026-04-10T03:58:59.260569Z","published":"2017-12-29T16:29:00.263Z","references":[{"type":"EVIDENCE","url":"https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rails/rails","events":[{"introduced":"0"},{"last_affected":"813af4655f9bf3c712cf50205eebd337070cee52"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.1.4"}]}}],"versions":["v0.10.0","v0.10.1","v0.11.0","v0.11.1","v0.12.0","v0.13.0","v0.13.1","v0.14.1","v0.14.3","v0.9.1","v0.9.2","v0.9.3","v0.9.4","v0.9.4.1","v0.9.5","v1.1.0","v1.1.0_RC1","v1.1.1","v2.0.0","v2.0.0_PR","v2.0.0_RC1","v2.0.0_RC2","v2.0.1","v3.0.0.beta.3","v3.0.0.beta3","v3.1.0.beta1","v3.1.0.rc1","v3.2.0.rc1","v4.0.0.beta1","v4.0.0.rc1","v4.2.0.beta1","v5.0.0.beta1","v5.0.0.beta2","v5.0.0.beta4","v5.1.0","v5.1.0.beta1","v5.1.0.rc1","v5.1.0.rc2","v5.1.1","v5.1.2.rc1","v5.1.3.rc1","v5.1.4","v5.1.4.rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-17917.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}