A couple of folks asked for the links I used for my talk last night, Here you
go, happy reading:

Also consolidated into a gist: https://gist.github.com/4549243

CVE-2012-5664 - SQL Inection Vulnerability
    Announcement - 
https://groups.google.com/forum/#!topic/rubyonrails-security/DCNTNp_qjFM 
    
http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/

CVE-2013-0155 - Unsafe Query Generation
    Announcement - 
https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/t1WFuuQyavI

CVE-2013-0156 - Multiple vulnerabilities in parameter parsing in Action Pack
    Announcement - 
https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/61bkgvnSGTQ

Links pertaining to 0155 and 0156
    
https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156
    http://www.insinuator.net/2013/01/rails-yaml/
    http://ronin-ruby.github.com/blog/2013/01/09/rails-pocs.html
    
http://blog.codeclimate.com/blog/2013/01/10/rails-remote-code-execution-vulnerability-explained/
    
http://www.mwdesilva.com/posts/68-diving-into-serialization-mischief-in-ruby-land-cve-2013-0156
    
https://community.rapid7.com/community/metasploit/blog/2013/01/10/exploiting-ruby-on-rails-with-metasploit-cve-2013-0156

enjoy,

-jeremy

-- 
========================================================================
 Jeremy Hinegardner                              [email protected] 

_______________________________________________
Bdrg-members mailing list
[email protected]
http://rubyforge.org/mailman/listinfo/bdrg-members

Reply via email to