Tasha Drew reports: Researchers investigating the Rails parameter parsing vulnerability discovered that the same or similar vulnerable code had made its way into multiple other libraries. If your application uses these libraries to process untrusted data, it may still be vulnerable even if you have upgraded Rails. Check your Gemfile and Gemfile.lock for vulnerable versions of the following libraries, and if you are using one, update it immediately. You can update each of these by using "bundle update <gem name>". httparty Vulnerable: <= 0.9.0 Fixed: 0.10.0 External references: https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031 https://rubygems.org/gems/httparty/
Created rubygem-httparty tracking bugs for this issue Affects: epel-all [bug 917231]
Created rubygem-httparty tracking bugs for this issue Affects: fedora-all [bug 917232]