It seems Rails just patched a CSRF vulnerability yesterday.



http://weblog.rubyonrails.com/2008/11/18/potential-circumvention-of-csrf-pro
tection-in-rails-2-1



Victor



On 11/18/08 11:41 PM, "Sean Cribbs" <[EMAIL PROTECTED]> wrote:

> For some reason, the CSRF protections in Rails require that if you use
> :active_record_store for sessions, the key given in your config setting
> must be equivalent to the key given in the call to protect_from_forgery
> in the controller.  One way around this might be to add an
> after_initialize block like so:
> 
> config.after_initialize do
>     ActionController::Base.request_forgery_protection_options.update
> :secret => 'putyourreallylongsha1hashkeyhere'
> end
> 
> Sean
> 
> Steven Line wrote:
>> Geez, I don't know what just happened here, but I stuck this line of
>> code in some obscure file I didn't even know existed and it fixed my
>> problem.
>> 
>> I stuck this line of code:
>> 
>>    protect_from_forgery :secret =>
>> 'asdfqwexxcoivswhallelujah!yippee!fqewwel', :except => :index
>> 
>> into my
>> 
>>    radiant-0.6.9/app/controllers/admin/page_controller.rb
>> 
>> and the error went away.
>> 
>>   
> 
> _______________________________________________
> Radiant mailing list
> Post:   Radiant@radiantcms.org
> Search: http://radiantcms.org/mailing-list/search/
> Site:   http://lists.radiantcms.org/mailman/listinfo/radiant

Victor Zuniga
Westerville Public Library
126 S. State St. | Westerville, OH 43081
Phone: 614.882.7277 | ext 165


_______________________________________________
Radiant mailing list
Post:   Radiant@radiantcms.org
Search: http://radiantcms.org/mailing-list/search/
Site:   http://lists.radiantcms.org/mailman/listinfo/radiant

Reply via email to