pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/www/ruby-actionpack3 Update ruby-actionpack3 to 3.0.17



details:   https://anonhg.NetBSD.org/pkgsrc/rev/c1bc34928acd
branches:  trunk
changeset: 607454:c1bc34928acd
user:      taca <taca%pkgsrc.org@localhost>
date:      Sun Aug 12 09:46:45 2012 +0000

description:
Update ruby-actionpack3 to 3.0.17

## Rails 3.0.17 (Aug 9, 2012)

* There is an XSS vulnerability in the strip_tags helper in Ruby on Rails, the
  helper doesn't correctly handle malformed html.  As a result an attacker can
  execute arbitrary javascript through the use of specially crafted malformed
  html.

  *Marek from Nethemba (www.nethemba.com) & Santiago Pastorino*

* When a "prompt" value is supplied to the `select_tag` helper, the "prompt"
  value is not escaped.  If untrusted data is not escaped, and is supplied as
  the prompt value, there is a potential for XSS attacks.
  Vulnerable code will look something like this:
    select_tag("name", options, :prompt => UNTRUSTED_INPUT)

  *Santiago Pastorino*

diffstat:

 www/ruby-actionpack3/distinfo |  8 ++++----
 1 files changed, 4 insertions(+), 4 deletions(-)

diffs (13 lines):

diff -r bf031a35b2fe -r c1bc34928acd www/ruby-actionpack3/distinfo
--- a/www/ruby-actionpack3/distinfo     Sun Aug 12 09:45:45 2012 +0000
+++ b/www/ruby-actionpack3/distinfo     Sun Aug 12 09:46:45 2012 +0000
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.15 2012/07/31 12:24:29 taca Exp $
+$NetBSD: distinfo,v 1.16 2012/08/12 09:46:45 taca Exp $
 
-SHA1 (actionpack-3.0.16.gem) = e07eb21b957a1d3fc08c8dd49c709cebe5274625
-RMD160 (actionpack-3.0.16.gem) = 9bcb8da14d62e84dfc8a181872634f1c5f2a3eec
-Size (actionpack-3.0.16.gem) = 355328 bytes
+SHA1 (actionpack-3.0.17.gem) = d376046160772c1ef74804ed24173c998482b7b7
+RMD160 (actionpack-3.0.17.gem) = 498c240a97f86c3f6f4a7d336a5d16952d513aba
+Size (actionpack-3.0.17.gem) = 355840 bytes



Home | Main Index | Thread Index | Old Index