Menu
Ruby on Rails security updates patch XSS, DoS vulnerabilities

Ruby on Rails security updates patch XSS, DoS vulnerabilities

The updates also strengthen the protection for a vulnerability patched in January

Ruby on Rails users are advised to upgrade to newly released versions of the Web development framework that contain important security fixes, according to the Rails development team.

The 3.2.16 Rails version released Tuesday addresses two cross-site scripting vulnerabilities and a denial-of-service issue and strengthens a previous patch for an unsafe query generation flaw.

The two cross-site scripting vulnerabilities, identified as CVE-2013-4491 and CVE-2013-6415, are located in the internationalization component and the number_to_currency helper, respectively. Both vulnerabilities allow an attacker to execute a cross-site scripting attack by sending specially crafted input to vulnerable applications.

The denial-of-service vulnerability, tracked as CVE-2013-6414, is located in the header handling component of Action View and allows an attacker to force an application to cache strings sent in specially crafted headers. This can cause the cache to grow indefinitely and consume all available memory on the server.

The other security issue patched is tracked as CVE-2013-6417 and can be used to bypass the patch released in January for an unsafe query generation issue identified as CVE-2013-0155. "The prior fix to CVE-2013-0155 was incomplete and the use of common 3rd party libraries can accidentally circumvent the protection," the Rails security team said.

The CVE-2013-0155 vulnerability itself is a variation of other two vulnerabilities, CVE-2012-2660 and CVE-2012-2694, that were patched in 2012, suggesting that this is a problem the Rails development team has been trying to fix for a while.

Rails version 4.0.2 was also released Tuesday and addresses the same vulnerabilities as the 3.2.16 version and an additional cross-side scripting flaw that only affects the 4.0 series. That vulnerability is identified as CVE-2013-6416 and is located in the simple_format helper.

The Ruby on Rails web application development framework has gained popularity among developers in recent years and is already being used on some very large websites including Hulu, Scribd, Kickstarter and GitHub.

Attackers have also shown interest in Rails. Back in May security researchers reported that a Rails vulnerability was being exploited to compromise servers and create a botnet.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags patch managementsoftwareonline safetyapplication developmentpatchesWeb services developmentExploits / vulnerabilities

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.‚Äč

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments