A cross-site scripting (XSS) flaw was found in the way the String class, used in Ruby on Rails, performed HTML escaping of SafeBuffer objects, when such objects were manipulated directly via '' method or other methods, also returning new instances of SafeBuffer object. By using these methods, such newly returned SafeBuffer instances would be inadvertently marked as HTML safe. If a Ruby on Rails application used SafeBuffer objects this way, a remote attacker could provide a specially-crafted input, which once processed by such SafeBuffer instance would pass the HTML escaping test without further filtering, possibly leading to arbitrary HTML or webscript execution.
Proposed upstream patches:
(against v3.0 branch)
(against v3.1 branch)
(against v3.2 branch)
Created rubygem-actionpack tracking bugs for this issue
Affects: fedora-all [bug 799279]
Added CVE as per http://www.openwall.com/lists/oss-security/2012/03/03/1
This issue affects the version of the rubygem-activesupport package, as shipped with Fedora release of 16. Please schedule an update.
This issue did NOT affect the version of the rubygem-activesupport package, as shipped with Fedora 15.
This issue did NOT affect the versions of the rubygem-activesupport package, as shipped with Fedora EPEL 6 and Fedora EPEL 5.
Created rubygem-activesupport tracking bugs for this issue
Affects: fedora-16 [bug 800000]
rubygem-actionpack-3.0.11-2.fc17, rubygem-activesupport-3.0.11-3.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
rubygem-actionpack-3.0.10-3.fc16, rubygem-activesupport-3.0.10-2.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.