Ruby on Rails update addresses security vulnerability
Version 3.0.6 of Ruby on Rails has been released. According to the developers, the maintenance and security update to the open source web framework addresses a vulnerability in the
This is reportedly caused when the
auto_link method automatically marks input strings as "html safe", even when the input is from an unknown origin. This could be exploited by a malicious person, for example, to conduct cross-site scripting (XSS) or script insertion attacks. Ruby on Rails 3.0.x to 3.0.5 is said to be affected. Updating to version 3.0.6 corrects the issue.
Other changes include ActiveRecord updates, fixes for schema support in the MySQL adapter and corrections for handling
before_type_cast on timezone aware attributes. All users are advised to upgrade.
Further details about the 3.0.6 security update can be found in a post on the Ruby on Rails blog and in the change log. Users can install the latest version using the
gem install rails or update with
gem update rails. Patches for existing versions are also available. However, at the time of this posting, the project's homepage still shows version 3.0.5 as the latest update. Rails is released under the MIT licence.
- XSS Vulnerability in auto_link() Options, Ruby on Rails security advisory.
- Potential XSS Vulnerability in auto_link(), Ruby on Rails security advisory.