A response splitting flaw in Ruby on Rails 2.3.x was reported [1] that could allow a remote attacker to inject arbitrary HTTP headers into a response due to insufficient sanitization of the values provided for response content types. This is corrected in upstream 2.3.13 (3.0.0 and later are not vulnerable). Patches are available in the advisory [1] and git [2]. [1] http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6ffc93bde0298768 [2] https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9
Created rubygem-actionpack tracking bugs for this issue Affects: fedora-14 [bug 732158] Affects: epel-5 [bug 677629]
This issue has been assigned the name CVE-2011-3186: http://www.openwall.com/lists/oss-security/2011/08/22/13
This issue does not affect the version of rubygem-actionpack shipped with Fedora 15. This issue has been addressed in Fedora-14 via the following advisory: https://admin.fedoraproject.org/updates/rubygem-actionpack-2.3.8-4.fc14