All Ruby On Rails Versions Suffer SQL Injection Flaw 81
Trailrunner7 writes with the news as posted at Threatpost (based on this advisory) that "All of the current versions of the Ruby on Rails Web framework have a SQL injection vulnerability that could allow an attacker to inject code into Web applications. The vulnerability is a serious one given the widespread use of the popular framework for developing Web apps, and the maintainers of Ruby on Rails have released new versions that fix the flaw, versions 3.2.10, 3.1.9 and 3.0.18. The advisory recommends that users running affected versions, which is essentially anyone using Ruby on Rails, upgrade immediately to one of the fixed versions, 3.2.10, 3.1.9 or 3.0.18. The vulnerability lies specifically in the Ruby on Rails framework, and its presence doesn't mean that all of the apps developed on vulnerable versions are susceptible to the bug."
Re: (Score:2)
http://www.youtube.com/watch?v=TprfUdSAHgM [youtube.com]
Re:bug found, bug fixed, bug deal (Score:5, Insightful)
When it's a major security flaw? SQL injection is one of the most common attack vectors to compromise websites and servers. It seems perfectly valid that this security advisory is spread far and wide.
Re:bug found, bug fixed, bug deal (Score:5, Informative)
When it's a major security flaw?
According to the article, this is not in fact a major security flaw, unless you have made your secret session key (HMAC) for the app public, and are using old style finder methods like find_by_id(2) etc. For a start the attacker has to know your HMAC - this is randomly generated when creating a rails app, and is not supposed to be publicly disclosed, though if your app is open source and you forgot to change it and left it in a public repo, it is possible someone could find it. The vast majority of rails apps this is not going to apply to, and there are obvious reasons you shouldn't make your session signing key public anyway.
So it looks like this is a bug which the majority of rails users won't have to worry about, but it's good that they fixed it.
Re: (Score:1)
The majority may not but it's not unheard of that developers slip up and make their secret keys public [computerworld.com].
Re: (Score:2)
Re: (Score:3)
If you publish the key used to sign sessions, people could fake session cookies and log in as someone else for example so this vulnerability would be the least of your problems. It's a problem all by itself, and is not something that is possible to do without publishing your entire app source on GitHub for example and forgetting to hide the passwords/keys which should be kept private (e.g db passwords, hmac). You can't publish it by mistake by misconfiguring your web server for example, it would have to be
Re: (Score:2)
The newer style without dynamic finders would just be Model.find(2), or Model.where(:id => 2). The books you are looking at are a little out of date perhaps.
Re: (Score:1)
Model.where(some_field: 5) is not the same as Model.find_by_some_field(5). The #where method returns a lazily evaluated database request which functions more or less like an array. #find_by_... returns either the "first"* model to match or nil if no models match and is much more useful for one-liners
* IIRC no ordering is guaranteed unless you have an #order portion in your model default scope
Re: (Score:1)
we are talking about RUBY on RAILS here...
everything diffrent from: its finally dead is news
Re: (Score:2)
Re: (Score:2, Informative)
No, the flaw applies if you are not using authlogic.
This is why most Rails apps that are running Authlogic are not exploitable
Re:this flaw only applies if you use authlogic (Score:5, Informative)
A known exploitable scenario is when all of the following applies:
1. You're using Authlogic (a third party but popular authentication library).
2. You must know the session secret token.
http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/ [phusion.nl]
Seems like you are mistaken. I believe they were saying that merely using Authlogic doesn't automatically make you vulnerable, but you need to be using it to be vulnerable.
Re: (Score:2)
Seems like you are mistaken. The very next sentence after the block you quoted says:
Re: (Score:2)
Furthermore, I don't know of any Rails web sites that let you
Rails 2.x? (Score:1)
I suppose their advice for those running legacy deployments of Rails 2.x apps is to upgrade to 3.x. Rad.
Re: (Score:2)
Is that you, little Bobby?
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Post.find_by_id(params[:id])
This is the standard way of finding a DB record by ID, and advised like this in all RoR books. It is one of the most fundamental calls in the whole framework.
Now, according to the advisory, the automatic type conversion (again, one of the core features of Ruby) can be exploited to produce an SQL injection from this.
Re: (Score:2)
Actually that's not true, since 3.0 at least the default style (from scaffolds for example) has been Post.find(params[:id]), many people don't use dynamic finders at all, as you can use where(...) and scopes instead.
Also, according to the advisory, the HMAC is required, that's really very unusual and important.
Re:Ruby Injection (Score:4, Informative)
This is an arbitrary SQL injection vulnerability. According to the advisory, it is in the very core of the Active Record. Anyone who has ever programmed for RoR has definitely used the following:
Post.find_by_id(params[:id])
This is the standard way of finding a DB record by ID, and advised like this in all RoR books. It is one of the most fundamental calls in the whole framework.
Not true - the more natural (and non-vulnerable) way to write this is:
Post.find(params[:id])
and that's the way normally recommended in books on the subject.
Pthhhhttpppt (Score:5, Informative)
Had me freaked out for a second, but then I RTFA (on accident I swear). Nothing to see here, please move along. If they have your HMAC key you are doing it wrong.
"So to inject arbitrary SQL, you need to tamper with the cookie, which requires the HMAC key. The HMAC key is the so-called session secret. As the name implies, it is supposed to be secret. Rails generates a random 512-bit secret upon project creation. This is why most Rails apps that are running Authlogic are not exploitable: the attacker does not know the secret. Open source Rails apps however can form a problem. Many of them come with a default session secret, but the user never customizes them, so all those instances end up using the same HMAC key, making them very easily exploitable. Of course, in this case the operator have to worry about more than just SQL injection. If the HMAC key is known then anybody can send fake credentials to the app."
Re:Pthhhhttpppt (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3)
Right, but the HMAC session key is used to encrypt user sessions. Change the key, and all the old sessions become invalid. Your suggestion is akin to saying, after someone stops working at your company, every user of the company's website should get logged out.
Re: (Score:2)
Forgive me if this is a silly question, but isnt "sending fake credentials to the front-end app" significantly less worrisome than "can send arbitrary SQL commands to the backend DB"?
Re: (Score:2)
Not really no, as they could impersonate an admin account and use that to execute whatever commands they wish.
Re: (Score:2)
It shouldn't really be, because if the backend DB is secured properly, "can send fake credentials to the front-end app" and "can explot the front-end app to send arbitrary SQL to the back-end DB" should be exactly equivalent, since the backend DB should only allow the front-end app's account to do things that the front-end ap
Hold your horses (Score:5, Informative)
Too briefly re-iterate certain main important points in the article.
More information (Score:5, Informative)
This article [phusion.nl] explains what the vulnerability is, how it is triggered, how severe it is and what the facts are.
Re: (Score:2)
Re: (Score:1)
Except that folks who don't know better are checking these files into their public repository and handing the attacker the private key.
Re: (Score:2)
That is one, and probably the most common, attack vector. There are other ways to introduce attack vectors as well, documented under the "Other exploitable scenarios" section. Even if you believe you are not vulnerable you should upgrade.
But..., but... (Score:1)
The perils of clever coding in dynamic languages (Score:1)
This exploit arises directly from clever code that hooks function names that don't even exist in the text of the codebase. So instead of find([:id]), you type find_by_id(). If I understand it correctly, the method-not-found exception handler pulls out the symbol from the function name itself and calls find(). This is the kind of crap that Ruby developers think is cool and useful.
In Ruby, you are never coding by contract - you are coding by duck tape. It's an awesome language for throwing together a prototyp
How are all versions effected? (Score:2)
Re: (Score:2)
ALL versions prior to the just-released fix are vulnerable, which means all versions actually in use when the announcement (simultaneous with the release of the fix) was made.
Real men (Score:1)
There is an upside (Score:5, Funny)
Thanks to this vulnerability, I was able to edit every Web2.0 website and change the color scheme from gray-on-gray to something readable. And I reduced the font size 10-20 points.
You can thank me later.
Performance problem (Score:1)