首页 / 操作系统 / Linux / Ruby on Rails跨站脚本执行漏洞(CVE-2013-6416)
发布日期:2013-12-03 更新日期:2013-12-05受影响系统: Ruby on Rails Ruby on Rails 4.0.x Ruby on Rails Ruby on Rails 3.2.x 描述: -------------------------------------------------------------------------------- BUGTRAQ ID: 64071 CVE(CAN) ID: CVE-2013-6416Ruby on Rails简称RoR或Rails,是一个使用Ruby语言写的开源Web应用框架,它是严格按照MVC结构开发的。Ruby on Rails 4.0.0、4.0.1的simple_format帮助程序没有正确过滤某些用户输入,在实现上存在安全漏洞,成功利用后可使攻击者在受影响站点上下文中执行任意脚本代码。<*来源:Kevin Reintjes
链接:http://secunia.com/advisories/55864/ *>建议: -------------------------------------------------------------------------------- 厂商补丁:Ruby on Rails ------------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:http://www.rubyonrails.com/ http://www.openwall.com/lists/oss-security/2013/12/03/10 http://www.openwall.com/lists/oss-security/2013/12/03/9 http://www.openwall.com/lists/oss-security/2013/12/03/11 http://www.openwall.com/lists/oss-security/2013/12/03/13相关阅读:Ubuntu下搭建Ruby On Rails开发环境 http://www.linuxidc.com/Linux/2012-06/61981.htmUbuntu 12.10下配置Ruby on Rails开发环境 http://www.linuxidc.com/Linux/2012-12/76126.htmNetwork Block Device (nbd) “authorized_client()”安全限制绕过漏洞AT&T Connect Participant Application ".SVT"文件处理缓冲区溢出漏洞相关资讯 Ruby on Rails