CVE-2022-32224
moderate-risk
Published 2022-12-05
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.
Do I need to act?
~
1.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 8030cff808657faa44828de001cd3b80364597de, eed417637b594b33b3b58b08dd41daa10c57e083, dc1242fd5a4d91e63846ab552a07e19ebf8716ac, 04972d9b9ef60796dc8f0917817b5392d61fcf09
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Activerecord
Affected Vendors
42
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
5/34 · Minimal
Exposure
5/34 · Minimal