A couple of folks asked for the links I used for my talk last night, Here you go, happy reading:
Also consolidated into a gist: https://gist.github.com/4549243 CVE-2012-5664 - SQL Inection Vulnerability Announcement - https://groups.google.com/forum/#!topic/rubyonrails-security/DCNTNp_qjFM http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/ CVE-2013-0155 - Unsafe Query Generation Announcement - https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/t1WFuuQyavI CVE-2013-0156 - Multiple vulnerabilities in parameter parsing in Action Pack Announcement - https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/61bkgvnSGTQ Links pertaining to 0155 and 0156 https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156 http://www.insinuator.net/2013/01/rails-yaml/ http://ronin-ruby.github.com/blog/2013/01/09/rails-pocs.html http://blog.codeclimate.com/blog/2013/01/10/rails-remote-code-execution-vulnerability-explained/ http://www.mwdesilva.com/posts/68-diving-into-serialization-mischief-in-ruby-land-cve-2013-0156 https://community.rapid7.com/community/metasploit/blog/2013/01/10/exploiting-ruby-on-rails-with-metasploit-cve-2013-0156 enjoy, -jeremy -- ======================================================================== Jeremy Hinegardner [email protected] _______________________________________________ Bdrg-members mailing list [email protected] http://rubyforge.org/mailman/listinfo/bdrg-members
