|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 2604-1 (rails - insufficient input validation)|
|Summary:||It was discovered that Rails, the Ruby web application development;framework, performed insufficient validation on input parameters,;allowing unintended type conversions. An attacker may use this to;bypass authentication systems, inject arbitrary SQL, inject and;execute arbitrary code, or perform a DoS attack on the application.|
It was discovered that Rails, the Ruby web application development
framework, performed insufficient validation on input parameters,
allowing unintended type conversions. An attacker may use this to
bypass authentication systems, inject arbitrary SQL, inject and
execute arbitrary code, or perform a DoS attack on the application.
rails on Debian Linux
For the stable distribution (squeeze), this problem has been fixed in
For the testing distribution (wheezy) and unstable distribution (sid),
this problem will be fixed soon.
We recommend that you upgrade your rails packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-0156|
CERT/CC vulnerability note: VU#380039
CERT/CC vulnerability note: VU#628463
Debian Security Information: DSA-2604 (Google Search)
RedHat Security Advisories: RHSA-2013:0153
RedHat Security Advisories: RHSA-2013:0154
RedHat Security Advisories: RHSA-2013:0155
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.