First published: Sat Aug 20 2011(Updated: )
A response splitting flaw in Ruby on Rails 2.3.x was reported [1] that could allow a remote attacker to inject arbitrary HTTP headers into a response due to insufficient sanitization of the values provided for response content types. This is corrected in upstream 2.3.13 (3.0.0 and later are not vulnerable). Patches are available in the advisory [1] and git [2]. [1] <a href="http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6ffc93bde0298768">http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6ffc93bde0298768</a> [2] <a href="https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9">https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rubygem-actionpack | <2.3.13 | 2.3.13 |
redhat/rubygem-actionpack | <3.0.0 | 3.0.0 |
Rubyonrails Rails | =2.3.2 | |
Rubyonrails Rails | =2.3.3 | |
Rubyonrails Rails | =2.3.4 | |
Rubyonrails Rails | =2.3.9 | |
Rubyonrails Rails | =2.3.10 | |
Rubyonrails Rails | =2.3.11 | |
Rubyonrails Rails | =2.3.12 | |
rubygems/actionpack | >=2.3.0<2.3.13 | 2.3.13 |
http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source&output=gplain
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.