{"id":"CVE-2012-6497","details":"The Authlogic gem for Ruby on Rails, when used with certain versions before 3.2.10, makes potentially unsafe find_by_id method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in secret_token.rb in an open-source product.","aliases":["GHSA-rx7j-mw4c-76g9"],"modified":"2026-01-27T04:11:29.837621Z","published":"2013-01-04T04:46:02Z","withdrawn":"2026-01-27T04:11:29.837621Z","references":[{"type":"ARTICLE","url":"http://openwall.com/lists/oss-security/2013/01/03/12"},{"type":"WEB","url":"http://www.securityfocus.com/bid/57084"},{"type":"EVIDENCE","url":"http://phenoelit.org/blog/archives/2012/12/21/let_me_github_that_for_you/index.html"},{"type":"EVIDENCE","url":"http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/"}],"schema_version":"1.7.3"}