[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE Request: ruby on rails header injection
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2008-11-21 2:09:29
Message-ID: Pine.GSO.4.51.0811202109260.20524 () faron ! mitre ! org
[Download RAW message or body]


======================================================
Name: CVE-2008-5189
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5189
Reference: CONFIRM:http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d
Reference: CONFIRM:http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing
Reference: CONFIRM:http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk
Reference: BID:32359
Reference: URL:http://www.securityfocus.com/bid/32359

CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows
remote attackers to inject arbitrary HTTP headers and conduct HTTP
response splitting attacks via a crafted URL to the redirect_to
function.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic