<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2011-0448</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2011-0448</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>12</Number>
        <Date>2024-09-09T01:13:02Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T12:55:54Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-09-09T01:13:02Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2011-0448</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2012-March/000065.html</URL>
      <Description>E-Mail link for SUSE-SU-2012:0434-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Studio Onsite Runner 1.2">
      <Branch Type="Product Name" Name="SUSE Studio Onsite Runner 1.2">
        <FullProductName ProductID="SUSE Studio Onsite Runner 1.2" CPE="cpe:/o:suse:suse-studio-onsite-runner:1.2">SUSE Studio Onsite Runner 1.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-actionmailer-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-actionmailer-2_3-2.3.14-0.7.4.3">rubygem-actionmailer-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-actionpack-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-actionpack-2_3-2.3.14-0.7.4.3">rubygem-actionpack-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activerecord-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-activerecord-2_3-2.3.14-0.7.4.3">rubygem-activerecord-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activeresource-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-activeresource-2_3-2.3.14-0.7.4.3">rubygem-activeresource-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activesupport-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-activesupport-2_3-2.3.14-0.7.4.3">rubygem-activesupport-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-rack-1.1.2-0.8.8.3">
      <FullProductName ProductID="rubygem-rack-1.1.2-0.8.8.3" CPE="cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*">rubygem-rack-1.1.2-0.8.8.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-rails-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-rails-2_3-2.3.14-0.7.4.3">rubygem-rails-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Relationship ProductReference="rubygem-actionmailer-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-actionmailer-2_3-2.3.14-0.7.4.3">rubygem-actionmailer-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-actionpack-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-actionpack-2_3-2.3.14-0.7.4.3">rubygem-actionpack-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activerecord-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-activerecord-2_3-2.3.14-0.7.4.3">rubygem-activerecord-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activeresource-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-activeresource-2_3-2.3.14-0.7.4.3">rubygem-activeresource-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activesupport-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-activesupport-2_3-2.3.14-0.7.4.3">rubygem-activesupport-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rack-1.1.2-0.8.8.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-rack-1.1.2-0.8.8.3">rubygem-rack-1.1.2-0.8.8.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rails-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-rails-2_3-2.3.14-0.7.4.3">rubygem-rails-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.</Note>
    </Notes>
    <CVE>CVE-2011-0448</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-actionmailer-2_3-2.3.14-0.7.4.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-actionpack-2_3-2.3.14-0.7.4.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-activerecord-2_3-2.3.14-0.7.4.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-activeresource-2_3-2.3.14-0.7.4.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-activesupport-2_3-2.3.14-0.7.4.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-rack-1.1.2-0.8.8.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-rails-2_3-2.3.14-0.7.4.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>7.5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
