{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2013-6417","title":"Title"},{"category":"description","text":"actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2013-6417","url":"https://www.suse.com/security/cve/CVE-2013-6417"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 846239 for CVE-2013-6417","url":"https://bugzilla.suse.com/846239"},{"category":"external","summary":"SUSE Bug 853625 for CVE-2013-6417","url":"https://bugzilla.suse.com/853625"},{"category":"external","summary":"SUSE Bug 853627 for CVE-2013-6417","url":"https://bugzilla.suse.com/853627"},{"category":"external","summary":"SUSE Bug 854786 for CVE-2013-6417","url":"https://bugzilla.suse.com/854786"},{"category":"external","summary":"Advisory link for SUSE-SU-2014:0152-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2014-January/000700.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2014:0153-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2014-January/000701.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2014:0686-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2014-May/000824.html"}],"title":"SUSE CVE CVE-2013-6417","tracking":{"current_release_date":"2025-10-08T00:37:03Z","generator":{"date":"2023-02-15T05:34:13Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2013-6417","initial_release_date":"2023-02-15T05:34:13Z","revision_history":[{"date":"2023-02-15T05:34:13Z","number":"2","summary":"Current version"},{"date":"2023-12-08T04:54:09Z","number":"3","summary":"Current version"},{"date":"2025-03-16T12:34:57Z","number":"4","summary":"Current version"},{"date":"2025-04-25T12:08:07Z","number":"5","summary":"Current version"},{"date":"2025-10-08T00:37:03Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Lifecycle Management Server 1.3","product":{"name":"SUSE Lifecycle Management Server 1.3","product_id":"SUSE Lifecycle Management Server 1.3","product_identification_helper":{"cpe":"cpe:/a:suse:sle-slms:1.3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Desktop 11 SP2","product":{"name":"SUSE Linux Enterprise Desktop 11 SP2","product_id":"SUSE Linux Enterprise Desktop 11 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sled:11:sp2"}}},{"category":"product_name","name":"SUSE Linux Enterprise Desktop 11 SP4","product":{"name":"SUSE Linux Enterprise Desktop 11 SP4","product_id":"SUSE Linux Enterprise Desktop 11 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sled:11:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 11 SP3","product":{"name":"SUSE Linux Enterprise High Availability Extension 11 SP3","product_id":"SUSE Linux Enterprise High Availability Extension 11 SP3","product_identification_helper":{"cpe":"cpe:/a:suse:sle-hae:11:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP2","product":{"name":"SUSE Linux Enterprise Server 11 SP2","product_id":"SUSE Linux Enterprise Server 11 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles:11:sp2"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP4","product":{"name":"SUSE Linux Enterprise Server 11 SP4","product_id":"SUSE Linux Enterprise Server 11 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles:11:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 11 SP2","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:11:sp2"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 11 SP4","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 11 SP4","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:11:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise Software Development Kit 11 SP2","product":{"name":"SUSE Linux Enterprise Software Development Kit 11 SP2","product_id":"SUSE Linux Enterprise Software Development Kit 11 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:sle-sdk:11:sp2"}}},{"category":"product_name","name":"SUSE Linux Enterprise Software Development Kit 11 SP4","product":{"name":"SUSE Linux Enterprise Software Development Kit 11 SP4","product_id":"SUSE Linux Enterprise Software Development Kit 11 SP4","product_identification_helper":{"cpe":"cpe:/a:suse:sle-sdk:11:sp4"}}},{"category":"product_name","name":"SUSE Studio Onsite 1.3","product":{"name":"SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3","product_identification_helper":{"cpe":"cpe:/o:suse:sle-studioonsite:1.3"}}},{"category":"product_name","name":"SUSE WebYast 1.3","product":{"name":"SUSE WebYast 1.3","product_id":"SUSE WebYast 1.3","product_identification_helper":{"cpe":"cpe:/o:suse:webyast:1.3"}}},{"category":"product_version","name":"hawk-0.6.1-0.17.1","product":{"name":"hawk-0.6.1-0.17.1","product_id":"hawk-0.6.1-0.17.1","product_identification_helper":{"cpe":"cpe:2.3:a:clusterlabs:hawk:0.6.1:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/hawk@0.6.1-0.17.1?upstream=hawk-0.6.1-0.17.1.src.rpm"}}},{"category":"product_version","name":"hawk-templates-0.6.1-0.17.1","product":{"name":"hawk-templates-0.6.1-0.17.1","product_id":"hawk-templates-0.6.1-0.17.1","product_identification_helper":{"cpe":"cpe:2.3:a:clusterlabs:hawk:0.6.1:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/hawk-templates@0.6.1-0.17.1?upstream=hawk-0.6.1-0.17.1.src.rpm"}}},{"category":"product_version","name":"rubygem-actionpack-2_3-2.3.17-0.13.2","product":{"name":"rubygem-actionpack-2_3-2.3.17-0.13.2","product_id":"rubygem-actionpack-2_3-2.3.17-0.13.2","product_identification_helper":{"purl":"pkg:rpm/suse/rubygem-actionpack-2_3@2.3.17-0.13.2?upstream=rubygem-actionpack-2_3-2.3.17-0.13.2.src.rpm"}}},{"category":"product_version","name":"rubygem-actionpack-3_2-3.2.12-0.11.1","product":{"name":"rubygem-actionpack-3_2-3.2.12-0.11.1","product_id":"rubygem-actionpack-3_2-3.2.12-0.11.1","product_identification_helper":{"purl":"pkg:rpm/suse/rubygem-actionpack-3_2@3.2.12-0.11.1?upstream=rubygem-actionpack-3_2-3.2.12-0.11.1.src.rpm"}}},{"category":"product_version","name":"rubygem-actionpack-3_2-3.2.12-0.19.1","product":{"name":"rubygem-actionpack-3_2-3.2.12-0.19.1","product_id":"rubygem-actionpack-3_2-3.2.12-0.19.1","product_identification_helper":{"purl":"pkg:rpm/suse/rubygem-actionpack-3_2@3.2.12-0.19.1?upstream=rubygem-actionpack-3_2-3.2.12-0.19.1.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.11.1 as component of SUSE Lifecycle Management Server 1.3","product_id":"SUSE Lifecycle Management Server 1.3:rubygem-actionpack-3_2-3.2.12-0.11.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.11.1","relates_to_product_reference":"SUSE Lifecycle Management Server 1.3"},{"category":"default_component_of","full_product_name":{"name":"hawk-0.6.1-0.17.1 as component of SUSE Linux Enterprise High Availability Extension 11 SP3","product_id":"SUSE Linux Enterprise High Availability Extension 11 SP3:hawk-0.6.1-0.17.1"},"product_reference":"hawk-0.6.1-0.17.1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"hawk-templates-0.6.1-0.17.1 as component of SUSE Linux Enterprise High Availability Extension 11 SP3","product_id":"SUSE Linux Enterprise High Availability Extension 11 SP3:hawk-templates-0.6.1-0.17.1"},"product_reference":"hawk-templates-0.6.1-0.17.1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-2_3-2.3.17-0.13.2 as component of SUSE Linux Enterprise Server 11 SP2","product_id":"SUSE Linux Enterprise Server 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2"},"product_reference":"rubygem-actionpack-2_3-2.3.17-0.13.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-2_3-2.3.17-0.13.2 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2"},"product_reference":"rubygem-actionpack-2_3-2.3.17-0.13.2","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-2_3-2.3.17-0.13.2 as component of SUSE Linux Enterprise Desktop 11 SP2","product_id":"SUSE Linux Enterprise Desktop 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2"},"product_reference":"rubygem-actionpack-2_3-2.3.17-0.13.2","relates_to_product_reference":"SUSE Linux Enterprise Desktop 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-2_3-2.3.17-0.13.2 as component of SUSE Linux Enterprise Software Development Kit 11 SP2","product_id":"SUSE Linux Enterprise Software Development Kit 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2"},"product_reference":"rubygem-actionpack-2_3-2.3.17-0.13.2","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.19.1 as component of SUSE Linux Enterprise Server 11 SP4","product_id":"SUSE Linux Enterprise Server 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.19.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.19.1 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.19.1","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP4"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.19.1 as component of SUSE Linux Enterprise Desktop 11 SP4","product_id":"SUSE Linux Enterprise Desktop 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.19.1","relates_to_product_reference":"SUSE Linux Enterprise Desktop 11 SP4"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.19.1 as component of SUSE Linux Enterprise Software Development Kit 11 SP4","product_id":"SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.19.1","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 11 SP4"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.11.1 as component of SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3:rubygem-actionpack-3_2-3.2.12-0.11.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.11.1","relates_to_product_reference":"SUSE Studio Onsite 1.3"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.11.1 as component of SUSE WebYast 1.3","product_id":"SUSE WebYast 1.3:rubygem-actionpack-3_2-3.2.12-0.11.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.11.1","relates_to_product_reference":"SUSE WebYast 1.3"}]},"vulnerabilities":[{"cve":"CVE-2013-6417","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2013-6417"}],"notes":[{"category":"general","text":"actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.","title":"CVE description"}],"product_status":{"recommended":["SUSE Lifecycle Management Server 1.3:rubygem-actionpack-3_2-3.2.12-0.11.1","SUSE Linux Enterprise Desktop 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2","SUSE Linux Enterprise Desktop 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1","SUSE Linux Enterprise High Availability Extension 11 SP3:hawk-0.6.1-0.17.1","SUSE Linux Enterprise High Availability Extension 11 SP3:hawk-templates-0.6.1-0.17.1","SUSE Linux Enterprise Server 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2","SUSE Linux Enterprise Server 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1","SUSE Linux Enterprise Server for SAP Applications 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2","SUSE Linux Enterprise Server for SAP Applications 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1","SUSE Linux Enterprise Software Development Kit 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2","SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1","SUSE Studio Onsite 1.3:rubygem-actionpack-3_2-3.2.12-0.11.1","SUSE WebYast 1.3:rubygem-actionpack-3_2-3.2.12-0.11.1"]},"references":[{"category":"external","summary":"CVE-2013-6417","url":"https://www.suse.com/security/cve/CVE-2013-6417"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 846239 for CVE-2013-6417","url":"https://bugzilla.suse.com/846239"},{"category":"external","summary":"SUSE Bug 853625 for CVE-2013-6417","url":"https://bugzilla.suse.com/853625"},{"category":"external","summary":"SUSE Bug 853627 for CVE-2013-6417","url":"https://bugzilla.suse.com/853627"},{"category":"external","summary":"SUSE Bug 854786 for CVE-2013-6417","url":"https://bugzilla.suse.com/854786"},{"category":"external","summary":"Advisory link for SUSE-SU-2014:0152-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2014-January/000700.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2014:0153-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2014-January/000701.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2014:0686-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2014-May/000824.html"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Lifecycle Management Server 1.3:rubygem-actionpack-3_2-3.2.12-0.11.1","SUSE Linux Enterprise Desktop 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2","SUSE Linux Enterprise Desktop 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1","SUSE Linux Enterprise High Availability Extension 11 SP3:hawk-0.6.1-0.17.1","SUSE Linux Enterprise High Availability Extension 11 SP3:hawk-templates-0.6.1-0.17.1","SUSE Linux Enterprise Server 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2","SUSE Linux Enterprise Server 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1","SUSE Linux Enterprise Server for SAP Applications 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2","SUSE Linux Enterprise Server for SAP Applications 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1","SUSE Linux Enterprise Software Development Kit 11 SP2:rubygem-actionpack-2_3-2.3.17-0.13.2","SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1","SUSE Studio Onsite 1.3:rubygem-actionpack-3_2-3.2.12-0.11.1","SUSE WebYast 1.3:rubygem-actionpack-3_2-3.2.12-0.11.1"]}],"threats":[{"category":"impact","date":"2013-12-04T09:15:30Z","details":"moderate"}],"title":"CVE-2013-6417"}]}