DSA-2466-1 rails -- cross site scripting

Related Vulnerabilities: CVE-2012-1099  

Sergey Nartimov discovered that in Rails, a Ruby based framework for web development, when developers generate html options tags manually, user input concatenated with manually built tags may not be escaped and an attacker can inject arbitrary HTML into the document. For the stable distribution (squeeze), this problem has been fixed in version 2.3.5-1.2+squeeze3. For the testing distribution (wheezy) and unstable distribution (sid), this problem has been fixed in version 2.3.14. We recommend that you upgrade your rails packages.

Debian Security Advisory

DSA-2466-1 rails -- cross site scripting

Date Reported:
09 May 2012
Affected Packages:
rails
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 668607.
In Mitre's CVE dictionary: CVE-2012-1099.
More information:

Sergey Nartimov discovered that in Rails, a Ruby based framework for web development, when developers generate html options tags manually, user input concatenated with manually built tags may not be escaped and an attacker can inject arbitrary HTML into the document.

For the stable distribution (squeeze), this problem has been fixed in version 2.3.5-1.2+squeeze3.

For the testing distribution (wheezy) and unstable distribution (sid), this problem has been fixed in version 2.3.14.

We recommend that you upgrade your rails packages.