A deserialization of untrusted data vulnerability exists in rails < 5.2.4.3, rails < 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://hackerone.com/reports/292797 | exploit third party advisory patch |
https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html | third party advisory mailing list |
https://www.debian.org/security/2020/dsa-4766 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html | mailing list third party advisory vendor advisory |