CVE-2022-32224

moderate-risk
Published 2022-12-05

A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.

Do I need to act?

~
1.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 8030cff808657faa44828de001cd3b80364597de, eed417637b594b33b3b58b08dd41daa10c57e083, dc1242fd5a4d91e63846ab552a07e19ebf8716ac, 04972d9b9ef60796dc8f0917817b5392d61fcf09
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (1)

Activerecord

Affected Vendors

42
/ 100
moderate-risk
Severity 32/34 · Critical
Exploitability 5/34 · Minimal
Exposure 5/34 · Minimal