Two SQL injection vulnerabilities were patched in Ruby on Rails, a popular open-source Web development framework used by some high-profile websites.
The Rails developers released versions 3.2.19, 4.0.7 and 4.1.3 of the framework on Wednesday, and advised users to upgrade as soon as possible. Hours later they released versions 4.0.8 and 4.1.4 to fix a regression caused by the 4.0.7 and 4.1.3 updates.
One of the two SQL injection vulnerabilities affects applications running on Rails 2.0.0 to 3.2.18 that also use the PostgreSQL database system and query bit string data types. The second vulnerability affects applications running on Rails 4.0.0 to 4.1.2 when using PostgreSQL and querying range data types.
Despite affecting different versions, the two flaws are related and both allow attackers to inject arbitrary SQL code into queries using specially crafted values.
“The only feasible workaround for this issue is to not allow user controlled values to be used in queries with the affected data types,” the Rails developers said in a security advisory. “Given the difficulty of ensuring this, upgrading is strongly advised.”
For cases where an immediate version upgrade is not possible, the developers also released code patches that can be applied manually.
Ruby on Rails has gained popularity among developers in recent years and is already used by large sites including Hulu, Scribd, Kickstarter and GitHub. This earned the framework inclusion into the Internet Bug Bounty program sponsored by Facebook and Microsoft as “a critical piece of internet infrastructure.”
This story, "Ruby on Rails gets patches for SQL injection vulnerabilities" was originally published by IDG News Service .