Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-tt6r-bytq-4fa4
Vulnerability ID VCID-tt6r-bytq-4fa4
Aliases CVE-2012-2694
GHSA-q34c-48gc-m9g8
Summary actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request `actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain `['xyz', nil]` values, a related issue to CVE-2012-2660.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-0154.html
epss 0.0022 https://api.first.org/data/v1/epss?cve=CVE-2012-2694
epss 0.0022 https://api.first.org/data/v1/epss?cve=CVE-2012-2694
epss 0.0022 https://api.first.org/data/v1/epss?cve=CVE-2012-2694
epss 0.0022 https://api.first.org/data/v1/epss?cve=CVE-2012-2694
epss 0.0022 https://api.first.org/data/v1/epss?cve=CVE-2012-2694
epss 0.0022 https://api.first.org/data/v1/epss?cve=CVE-2012-2694
epss 0.0022 https://api.first.org/data/v1/epss?cve=CVE-2012-2694
epss 0.0022 https://api.first.org/data/v1/epss?cve=CVE-2012-2694
epss 0.0022 https://api.first.org/data/v1/epss?cve=CVE-2012-2694
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-q34c-48gc-m9g8
generic_textual MODERATE https://github.com/rails/rails
generic_textual MODERATE https://github.com/rails/rails/commit/2f3bc0467311781ac1ceb2c8c2b09002c8fe143a
generic_textual MODERATE https://github.com/rails/rails/commit/c202638225519b5e1a03ebe523b109c948fb0e52
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-2694.yml
generic_textual MODERATE https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source&output=gplain
generic_textual MODERATE https://groups.google.com/g/rubyonrails-security/c/jILZ34tAHF4/m/7x0hLH-o0-IJ
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2012-2694
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.44593
EPSS Score 0.0022
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:47:27.572485+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2012-2694.yml 38.0.0