LWN.net Logo

rails: code execution and more

Package(s):rails CVE #(s):CVE-2013-0156
Created:January 10, 2013 Updated:January 23, 2013
Description:

From the Debian advisory:

It was discovered that Rails, the Ruby web application development framework, performed insufficient validation on input parameters, allowing unintended type conversions. An attacker may use this to bypass authentication systems, inject arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on the application.

Lots more information can be found in the Rails advisory and this analysis.

Alerts:
Debian DSA-2604-1 2013-01-09
Red Hat RHSA-2013:0153-01 2013-01-10
Fedora FEDORA-2013-0568 2013-01-20
Fedora FEDORA-2013-0568 2013-01-20
Fedora FEDORA-2013-0568 2013-01-20
Fedora FEDORA-2013-0635 2013-01-23
Fedora FEDORA-2013-0686 2013-01-23
Fedora FEDORA-2013-0635 2013-01-23
Fedora FEDORA-2013-0686 2013-01-23
Fedora FEDORA-2013-0635 2013-01-23
Fedora FEDORA-2013-0686 2013-01-23
Fedora FEDORA-2013-0635 2013-01-23
Fedora FEDORA-2013-0686 2013-01-23
openSUSE openSUSE-SU-2013:0278-1 2013-02-12
openSUSE openSUSE-SU-2013:0280-1 2013-02-12
SUSE SUSE-SU-2013:0486-1 2013-03-19
SUSE SUSE-SU-2013:0508-1 2013-03-20
SUSE SUSE-SU-2013:0606-1 2013-04-03

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds