Date: Sun, 17 Feb 2013 16:33:19 +0000 (UTC) From: Steve Wills <swills@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r312426 - head/security/vuxml Message-ID: <201302171633.r1HGXJ8k092410@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: swills Date: Sun Feb 17 16:33:18 2013 New Revision: 312426 URL: http://svnweb.freebsd.org/changeset/ports/312426 Log: - Document activemodel issue Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Feb 17 16:25:53 2013 (r312425) +++ head/security/vuxml/vuln.xml Sun Feb 17 16:33:18 2013 (r312426) @@ -51,6 +51,42 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="beab40bf-c1ca-4d2b-ad46-2f14bac8a968"> + <topic>Ruby Activemodel Gem -- Circumvention of attr_protected</topic> + <affects> + <package> + <name>rubygem18-activemodel</name> + <range><lt>3.2.12</lt></range> + </package> + <package> + <name>rubygem19-activemodel</name> + <range><lt>3.2.12</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Aaron Patterson reports:</p> + <blockquote cite="https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/AFBKNY7VSH8"> + <p>The attr_protected method allows developers to specify a blacklist + of model attributes which users should not be allowed to assign to. + By using a specially crafted request, attackers could circumvent + this protection and alter values that were meant to be protected.</p> + <p>All users running an affected release should either upgrade or use + one of the work arounds immediately. Users should also consider + switching from attr_protected to the whitelist method + attr_accessible which is not vulnerable to this attack.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-0276</cvename> + </references> + <dates> + <discovery>2013-02-11</discovery> + <entry>2013-02-17</entry> + </dates> + </vuln> + <vuln vid="7fe5b84a-78eb-11e2-8441-00e0814cab4e"> <topic>jenkins -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201302171633.r1HGXJ8k092410>