Ruby on Rails Multiple Vulnerabilities
Last Update Date:
20 Mar 2013 14:57
Release Date:
20 Mar 2013
4028
Views
RISK: Medium Risk
TYPE: Clients - Productivity Products
Multiple vulnerabilities have been identified in Ruby on Rails, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).
- An error when handling keys to a hash in Active Record can be exploited to potentially convert hash keys to symbols and cause a DoS condition.
- Certain input is not properly sanitised in the "sanitize_css" method in Action Pack before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
- An error when parsing XML entities via ActiveSupport::XmlMini_JDOM in ActiveSupport can potentially be exploited to e.g. disclose contents of certain local files or cause a DoS condition by sending specially crafted XML data including external entity references. Successful exploitation of this vulnerability requires a JRuby application using the JDOM backend. This vulnerability is reported in versions 3.0.0 and later.
- The sanitize helper within the HTML module does not properly verify allowed protocols, which can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Impact
- Cross-Site Scripting
- Denial of Service
- Remote Code Execution
System / Technologies affected
- Ruby on Rails 2.3.x
- Ruby on Rails 3.0.x
- Ruby on Rails 3.1.x
- Ruby on Rails 3.2.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update or upgrade to version 3.2.13, 3.1.12, or 2.3.18 or apply patches (please see the vendor's advisory for details)
http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
Vulnerability Identifier
Source
Related Link
Share with