The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2011/08/17/1 | mailing list patch |
http://www.openwall.com/lists/oss-security/2011/08/22/13 | mailing list patch |
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2011/08/19/11 | mailing list patch |
http://www.openwall.com/lists/oss-security/2011/08/20/1 | mailing list patch |
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html | vendor advisory |
https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552 | patch |
http://www.openwall.com/lists/oss-security/2011/08/22/14 | mailing list |
http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain | mailing list patch |
http://www.openwall.com/lists/oss-security/2011/08/22/5 | mailing list patch |
http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6 | patch |
https://bugzilla.redhat.com/show_bug.cgi?id=731432 | patch |