|
|
| |
|
| |
rails: code execution and more
| Package(s): | rails |
CVE #(s): | CVE-2013-0156
|
| Created: | January 10, 2013 |
Updated: | January 23, 2013 |
| Description: |
From the Debian advisory:
It was discovered that Rails, the Ruby web application development
framework, performed insufficient validation on input parameters,
allowing unintended type conversions. An attacker may use this to
bypass authentication systems, inject arbitrary SQL, inject and
execute arbitrary code, or perform a DoS attack on the application.
Lots more information can be found in the Rails advisory and this analysis. |
| Alerts: |
|
( Log in to post comments)
|
|
|