U radu programskog paketa rubygem-actionpack uočeno je više sigurnosnih propusta koje udaljeni napadač može iskoristiti za proizvoljno pokretanje HTML, SQL i skriptnog koda.
Paket:
rubygem-actionpack 3.x
Operacijski sustavi:
Fedora 14, Fedora 15, Fedora 16
Kritičnost:
7.5
Problem:
pogreška u programskoj komponenti, XSS
Iskorištavanje:
udaljeno
Posljedica:
pokretanje SQL koda, umetanje HTML i skriptnog koda
Sigurnosne ranjivosti su posljedica pogrešaka u programskoj komponenti "actionpack/lib/action_view/template/resolver.rb", XSS ranjivosti u "activesupport/lib/active_support/core_ext/string/output_safety.rb", CRLF nepravilnosti u komponenti "actionpack/lib/action_controller/response.rb", itd.
Posljedica:
Udaljeni napadač ranjivosti može iskoristiti za proizvoljno pokretanje HTML, skriptnog i SQL koda.
Rješenje:
Svim se korisnicima navedenog programskog paketa savjetuje nadogradnja paketa na novije inačice.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-11386
2011-08-23 13:28:29
--------------------------------------------------------------------------------
Name : rubygem-actionpack
Product : Fedora 16
Version : 3.0.10
Release : 1.fc16
URL : http://www.rubyonrails.org
Summary : Web-flow and rendering framework putting the VC in MVC
Description :
Eases web-request routing, handling, and response as a half-way front,
half-way page controller. Implemented with specific emphasis on enabling easy
unit/integration testing that doesn't require a browser.
--------------------------------------------------------------------------------
Update Information:
Update to Rails 3.0.10 which fixes several security bugs.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #731436 - CVE-2011-2931 rubygem-actionpack: XSS vulnerability in
strip_tags helper (Ruby on Rails)
https://bugzilla.redhat.com/show_bug.cgi?id=731436
[ 2 ] Bug #731432 - CVE-2011-2929 rubygem-actionpack: filter skipping
vulnerability (Ruby on Rails)
https://bugzilla.redhat.com/show_bug.cgi?id=731432
[ 3 ] Bug #731438 - CVE-2011-2930 rubygem-activerecord: SQL injection
vulnerability in quote_table_name (Ruby on Rails)
https://bugzilla.redhat.com/show_bug.cgi?id=731438
[ 4 ] Bug #731435 - CVE-2011-2932 rubygem-activesupport: XSS vulnerability in
escaping function (Ruby on Rails)
https://bugzilla.redhat.com/show_bug.cgi?id=731435
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update rubygem-actionpack' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-11567
2011-08-26 18:30:06
--------------------------------------------------------------------------------
Name : rubygem-actionpack
Product : Fedora 14
Version : 2.3.8
Release : 4.fc14
URL : http://www.rubyonrails.org
Summary : Web-flow and rendering framework putting the VC in MVC
Description :
Eases web-request routing, handling, and response as a half-way front,
half-way page controller. Implemented with specific emphasis on enabling easy
unit/integration testing that doesn't require a browser.
--------------------------------------------------------------------------------
Update Information:
fixes for BZs #731436, #732156
--------------------------------------------------------------------------------
ChangeLog:
* Tue Aug 23 2011 Mo Morsi <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:2.3.8-4
- Fixed BZs #731436 and #732156
* Thu Feb 24 2011 VÄ
Posljednje sigurnosne preporuke