Ruby on Rails updates fix security holes
The Ruby on Rails developers have released version 2.3.11 and 3.0.4 of Ruby on Rails which are maintenance and security updates that address four security vulnerabilities in the open source web framework. According to the developers, the latest updates address a cross-site scripting (XSS) vulnerability in the mail_to helper when used with the :encode => :javascript
option, as well as a cross-site request forgery (CSRF) vulnerability that could allow an attacker to circumvent built-in protections. All versions up to and including 2.3.10 and 3.0.3 are said to be affected.
Two vulnerabilities which only affect the 3.0.x branch of Ruby on Rails have also been corrected; an SQL injection issue with the limit() method and a weakness in the file-system filtering code. The developers strongly advise all users to update to the latest versions as soon as possible.
More details about the security updates can be found in a post on the Ruby on Rails blog by Michael Koziarski. Users can install the latest version using the gem install rails
or update with gem update rails
. Patches for existing versions are also available. However, at the time of this posting, the project's homepage still shows version 3.0.3 and 2.3.8 as the latest updates. Rails is released under the MIT licence.
See also:
- Potential XSS Problem with mail_to :encode => :javascript, Ruby on Rails security advisory.
- CSRF Protection Bypass in Ruby on Rails Options, Ruby on Rails security advisory.
- Filter Problems on Case-Insensitive Filesystems, Ruby on Rails security advisory.
- Potential SQL Injection in Rails 3.0.x, Ruby on Rails security advisory.
(crve)