This is well documented and doesn't happen with good web practices. If you accept and trust user input, you fail.
Summary of the exploit: If you accept a username from a browser that is (artificially, maliciously) submitted in a typed fashion (as a number or bool), and accept it as such, implicit conversion kicks in.
Both Rails and MySQL perform implicit conversion, so if you sanity check your apps to make sure the string you get from your browser or web service is in fact a string, there is no problem.
I don't use MySQL because for reasons just like this - so I'm not all that surprised. That said - it would be interesting to see Devise put to the test to see if it is indeed a problem for Devise.
Turns out the matches are determined by the beginning character of the string column. For example, if the user's token is '5feZas0352f', the query
will match that user. And if it doesn't start with a number, 0 will match it.The behaviour is documented here:
http://dev.mysql.com/doc/refman/5.6/en/type-conversion.html
> For comparisons of a string column with a number ... there are many different strings that may convert to the value 1, such as '1', ' 1', or '1a'.