drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in Rails
Name: |
Cross-Site Scripting in Rails |
|
ID: |
DSA-3651-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian jessie |
|
Datum: |
Do, 25. August 2016, 20:43 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6316 |
|
Applikationen: |
Rails |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3651-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 25, 2016 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : rails CVE ID : CVE-2016-6316 Debian Bug : 834155
Andrew Carpenter of Critical Juncture discovered a cross-site scripting vulnerability affecting Action View in rails, a web application framework written in Ruby. Text declared as "HTML safe" will not have quotes escaped when used as attribute values in tag helpers.
For the stable distribution (jessie), this problem has been fixed in version 2:4.1.8-1+deb8u4.
For the unstable distribution (sid), this problem has been fixed in version 2:4.2.7.1-1.
We recommend that you upgrade your rails packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJXvxiDAAoJEAVMuPMTQ89E23wP/Rp7Mu2GiYIl5MUPDG9o9rvG H2kJ48UAB4SLZzeLAZ2LB39hRDUuSeRGMjGI6D8G8WWVOlukcF+UKwDcjnzThw7W 5yhfwCTYRlCwGlaM2ECMB90uSlqR31Bpgo4kkZ9myi6HpxZaUAXTKH6kGi1KUn+I akkkLEJtKrd4p8rBV1ca/s/ONx7POig6a5K01ktBtMcwK6ZxePvKuUmJYpUpmkxT iv+frqeNJfDZmSmHsuXf2wCmUuiNXFk/GHmuNko5QC/dzVVvDLvIc3ULvhpkGVpy u6/VBJS8JL4wxnJH1WbJsCqCd/5SZqpUh4/lUwPQeKJDBl6ytfofKR32uE4EyiLD gIw/WaT/3wkaOyTd6y/yTWiHkQlNlaew5QC4akJ7WNv1QAKeAqy700O+pTYjvdZy Dvj3mnRLC6IK2xaP4//bATHrfSoz6rC0VZ6nlKVY+3dXQRnBMkIohJ1ivKh1gmMA I5EPfbIpwvKog54uBgTCNnjcvrdQHVoNcph7+dgl2hkcmw+YALPQ3QrQpGMaSArc bKw5BqPxr/fdFdq13I8njIKBpSROfzFZBQ0fq7YBsHLKlg1uPx0sMRMdFavbOsv9 rV6CuCL7Fg/tc3Of2kK+tdpTKQlfP/wKneXBHbo4+i7JrpHTVbjmZ6U6oO6+9wwn vXYV3DKz8io569rD+QPZ =akwG -----END PGP SIGNATURE-----
|
|
|
|