Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title rails regression
Informations
Name DSA-2301 First vendor Publication 2011-09-05
Vendor Debian Last vendor Modification 2012-01-23
Severity (Vendor) N/A Revision 2

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

It was discovered that the last security update for Ruby on Rails, DSA-2301-1, introduced a regression in the libactionpack-ruby package.

For the oldstable distribution (lenny), this problem has been fixed in version 2.1.0-7+lenny2.

For the stable distribution (squeeze), this problem has been fixed in version 2.3.5-1.2+squeeze2.

We recommend that you upgrade your rails packages.

Original Source

Url : http://www.debian.org/security/2012/dsa-2301

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
25 % CWE-94 Failure to Control Generation of Code ('Code Injection')
25 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12767
 
Oval ID: oval:org.mitre.oval:def:12767
Title: DSA-2260-1 rails -- several
Description: Two vulnerabilities were discovered in Ruby on Rails, a web application framework. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-3086 The cookie store may be vulnerability to a timing attack, potentially allowing remote attackers to forge message digests. CVE-2009-4214 A cross-site scripting vulnerability in the strip_tags function allows remote user-assisted attackers to inject arbitrary web script.
Family: unix Class: patch
Reference(s): DSA-2260-1
CVE-2009-3086
CVE-2009-4214
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): rails
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14680
 
Oval ID: oval:org.mitre.oval:def:14680
Title: DSA-2301-1 rails -- several
Description: Several vulnerabilities have been discovered in Rails, the Ruby web application framework. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-4214 A cross-site scripting vulnerability had been found in the strip_tags function. An attacker may inject non-printable characters that certain browsers will then evaluate. This vulnerability only affects the oldstable distribution. CVE-2011-2930 A SQL injection vulnerability had been found in the quote_table_name method could allow malicious users to inject arbitrary SQL into a query. CVE-2011-2931 A cross-site scripting vulnerability had been found in the strip_tags helper. An parsing error can be exploited by an attacker, who can confuse the parser and may inject HTML tags into the output document. CVE-2011-3186 A newline injection vulnerability had been found in response.rb. This vulnerability allows an attacker to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.
Family: unix Class: patch
Reference(s): DSA-2301-1
CVE-2011-2930
CVE-2011-2931
CVE-2011-3186
CVE-2009-4214
Version: 5
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): rails
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15291
 
Oval ID: oval:org.mitre.oval:def:15291
Title: DSA-2301-2 rails -- several
Description: It was discovered that the last security update for Ruby on Rails, DSA-2301-1, introduced a regression in the libactionpack-ruby package.
Family: unix Class: patch
Reference(s): DSA-2301-2
CVE-2011-2930
CVE-2011-2931
CVE-2011-3186
CVE-2009-4214
Version: 5
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): rails
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 95
Application 11

OpenVAS Exploits

Date Description
2012-04-02 Name : Fedora Update for rubygem-rails FEDORA-2011-11386
File : nvt/gb_fedora_2011_11386_rubygem-rails_fc16.nasl
2012-04-02 Name : Fedora Update for rubygem-activesupport FEDORA-2011-11386
File : nvt/gb_fedora_2011_11386_rubygem-activesupport_fc16.nasl
2012-04-02 Name : Fedora Update for rubygem-activeresource FEDORA-2011-11386
File : nvt/gb_fedora_2011_11386_rubygem-activeresource_fc16.nasl
2012-04-02 Name : Fedora Update for rubygem-activerecord FEDORA-2011-11386
File : nvt/gb_fedora_2011_11386_rubygem-activerecord_fc16.nasl
2012-04-02 Name : Fedora Update for rubygem-actionmailer FEDORA-2011-11386
File : nvt/gb_fedora_2011_11386_rubygem-actionmailer_fc16.nasl
2012-04-02 Name : Fedora Update for rubygem-actionpack FEDORA-2011-11386
File : nvt/gb_fedora_2011_11386_rubygem-actionpack_fc16.nasl
2012-03-19 Name : Fedora Update for rubygem-railties FEDORA-2011-11386
File : nvt/gb_fedora_2011_11386_rubygem-railties_fc16.nasl
2012-03-19 Name : Fedora Update for rubygem-activemodel FEDORA-2011-11386
File : nvt/gb_fedora_2011_11386_rubygem-activemodel_fc16.nasl
2012-02-11 Name : Debian Security Advisory DSA 2301-2 (rails)
File : nvt/deb_2301_2.nasl
2011-09-21 Name : FreeBSD Ports: rubygem-rails
File : nvt/freebsd_rubygem-rails3.nasl
2011-09-21 Name : Debian Security Advisory DSA 2301-1 (rails)
File : nvt/deb_2301_1.nasl
2011-09-12 Name : Fedora Update for rubygem-actionpack FEDORA-2011-11567
File : nvt/gb_fedora_2011_11567_rubygem-actionpack_fc14.nasl
2011-09-12 Name : Fedora Update for rubygem-actionpack FEDORA-2011-11572
File : nvt/gb_fedora_2011_11572_rubygem-actionpack_fc15.nasl
2010-05-12 Name : Mac OS X 10.6.3 Update / Mac OS X Security Update 2010-002
File : nvt/macosx_upd_10_6_3_secupd_2010-002.nasl
2009-12-30 Name : Fedora Core 12 FEDORA-2009-13393 (rubygem-actionpack)
File : nvt/fcore_2009_13393.nasl
2009-12-30 Name : Fedora Core 11 FEDORA-2009-13361 (rubygem-actionpack)
File : nvt/fcore_2009_13361.nasl
2009-12-30 Name : Gentoo Security Advisory GLSA 200912-02 (rails)
File : nvt/glsa_200912_02.nasl
2009-12-14 Name : Fedora Core 10 FEDORA-2009-12966 (rubygem-actionpack)
File : nvt/fcore_2009_12966.nasl
2009-12-09 Name : Ruby on Rails 'strip_tags' Cross Site Scripting Vulnerability (Linux)
File : nvt/gb_ruby_rails_xss_vuln_lin.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
74617 Ruby on Rails actionpack/lib/action_controller/vendor/html-scanner/html/node....

74616 Ruby on Rails actionpack/lib/action_controller/response.rb Content Type Handl...

74614 Ruby on Rails activerecord/lib/active_record/connection_adapters/ quote_table...

60544 Ruby on Rails HTML::Tokenizer strip_tags Function XSS

Nessus® Vulnerability Scanner

Date Description
2014-12-15 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201412-28.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_4_rubygem-actionmailer-111116.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_rubygem-actionmailer-111116.nasl - Type : ACT_GATHER_INFO
2011-09-07 Name : The remote Fedora host is missing a security update.
File : fedora_2011-11572.nasl - Type : ACT_GATHER_INFO
2011-09-07 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2011-11386.nasl - Type : ACT_GATHER_INFO
2011-09-07 Name : The remote Fedora host is missing a security update.
File : fedora_2011-11567.nasl - Type : ACT_GATHER_INFO
2011-09-06 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2301.nasl - Type : ACT_GATHER_INFO
2011-06-15 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2260.nasl - Type : ACT_GATHER_INFO
2010-03-29 Name : The remote host is missing a Mac OS X update that fixes various security issues.
File : macosx_10_6_3.nasl - Type : ACT_GATHER_INFO
2010-03-29 Name : The remote host is missing a Mac OS X update that fixes various security issues.
File : macosx_SecUpd2010-002.nasl - Type : ACT_GATHER_INFO
2010-03-11 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_rubygem-actionpack-2_3-100205.nasl - Type : ACT_GATHER_INFO
2010-03-04 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_rubygem-actionpack-100205.nasl - Type : ACT_GATHER_INFO
2010-03-04 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_rubygem-actionpack-100210.nasl - Type : ACT_GATHER_INFO
2010-03-04 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_rubygem-actionpack-100210.nasl - Type : ACT_GATHER_INFO
2009-12-22 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200912-02.nasl - Type : ACT_GATHER_INFO
2009-12-18 Name : The remote Fedora host is missing a security update.
File : fedora_2009-13393.nasl - Type : ACT_GATHER_INFO
2009-12-18 Name : The remote Fedora host is missing a security update.
File : fedora_2009-13361.nasl - Type : ACT_GATHER_INFO
2009-12-10 Name : The remote Fedora host is missing a security update.
File : fedora_2009-12966.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:30:24
  • Multiple Updates