diff options
author | swills <swills@FreeBSD.org> | 2013-02-18 00:33:18 +0800 |
---|---|---|
committer | swills <swills@FreeBSD.org> | 2013-02-18 00:33:18 +0800 |
commit | 193070a5b4926c9cd5cf19f7a5664abc1ccfd75b (patch) | |
tree | 4a04cd9d13e739edf67f9662f6095915acfa5736 /security | |
parent | 009840ea4786d273d72b2ddc0baa6faeede29e2d (diff) | |
download | freebsd-ports-gnome-193070a5b4926c9cd5cf19f7a5664abc1ccfd75b.tar.gz freebsd-ports-gnome-193070a5b4926c9cd5cf19f7a5664abc1ccfd75b.tar.zst freebsd-ports-gnome-193070a5b4926c9cd5cf19f7a5664abc1ccfd75b.zip |
- Document activemodel issue
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7c7cd1099236..047dd6484eef 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,42 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="beab40bf-c1ca-4d2b-ad46-2f14bac8a968"> + <topic>Ruby Activemodel Gem -- Circumvention of attr_protected</topic> + <affects> + <package> + <name>rubygem18-activemodel</name> + <range><lt>3.2.12</lt></range> + </package> + <package> + <name>rubygem19-activemodel</name> + <range><lt>3.2.12</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Aaron Patterson reports:</p> + <blockquote cite="https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/AFBKNY7VSH8"> + <p>The attr_protected method allows developers to specify a blacklist + of model attributes which users should not be allowed to assign to. + By using a specially crafted request, attackers could circumvent + this protection and alter values that were meant to be protected.</p> + <p>All users running an affected release should either upgrade or use + one of the work arounds immediately. Users should also consider + switching from attr_protected to the whitelist method + attr_accessible which is not vulnerable to this attack.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-0276</cvename> + </references> + <dates> + <discovery>2013-02-11</discovery> + <entry>2013-02-17</entry> + </dates> + </vuln> + <vuln vid="7fe5b84a-78eb-11e2-8441-00e0814cab4e"> <topic>jenkins -- multiple vulnerabilities</topic> <affects> |