no (rails was once a dep, but had a very short life in sipxecs)
On Wed, Jan 9, 2013 at 12:38 PM, Burleigh, Matt <matt.burle...@eiisolutions.net> wrote: > Does this affect SIPXECS 4.4 or 4.6? > > > > https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/61bkgvnSGTQ > > > > Multiple vulnerabilities in parameter parsing in Action Pack > > There are multiple weaknesses in the parameter parsing code for Ruby on > Rails which allows attackers to bypass authentication systems, inject > arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on > a Rails application. This vulnerability has been assigned the CVE identifier > CVE-2013-0156. > > Versions Affected: ALL versions > Not affected: NONE > Fixed Versions: 3.2.11, 3.1.10, 3.0.19, 2.3.15 > > Impact > ------ > The parameter parsing code of Ruby on Rails allows applications to > automatically cast values from strings to certain data types. Unfortunately > the type casting code supported certain conversions which were not suitable > for performing on user-provided data including creating Symbols and parsing > YAML. These unsuitable conversions can be used by an attacker to compromise > a Rails application. > > Due to the critical nature of this vulnerability, and the fact that portions > of it have been disclosed publicly, all users running an affected release > should either upgrade or use one of the work arounds *immediately*. > > Releases > -------- > The 3.2.11, 3.1.10, 3.0.19 and 2.3.15 releases are available at the normal > locations. > > Workarounds > ----------- > The work arounds differ depending on the Rails version you are using, and > whether or not your application needs to support XML Parameters. > > Disabling XML Entirely > ---------------------- > Users who don't need to support XML parameters should disable XML parsing > entirely by placing one of the following snippets inside an application > initializer. > > Rails 3.2, 3.1 and 3.0 > ---------------------- > ActionDispatch::ParamsParser::DEFAULT_PARSERS.delete(Mime::XML) > > Rails 2.3 > --------- > ActionController::Base.param_parsers.delete(Mime::XML) > > > Removing YAML and Symbol support from the XML parser > ---------------------------------------------------- > If your application must continue to parse XML you must disable the YAML and > Symbol type conversion from the Rails XML parser. You should place one of > the following code snippets in an application initializer to ensure your > application isn't vulnerable. You should also consider greatly reducing the > value of REXML::Document.entity_expansion_limit to limit the risk of entity > explosion attacks. > > YAML Parameter Parsing > ---------------------- > Rails has also shipped with YAML parameter parsing code, this was only ever > enabled by default in Rails 1.1.0, but users who do enable it are > vulnerable to all the exploits mentioned above.. There is no fix for YAML > object injection, so if you have enabled it you must disable it immediately. > > For 2.x apps, check whether your app sets > `ActionController::Base.param_parsers[Mime::YAML] = :yaml` and snip that out > if it does. > > For 3.x apps do this to disable: > > ActionDispatch::ParamsParser::DEFAULT_PARSERS.delete(Mime::YAML) > > Rails 3.2, 3.1, 3.0 > --------- > > ActiveSupport::XmlMini::PARSING.delete("symbol") > ActiveSupport::XmlMini::PARSING.delete("yaml") > > Rails 2.3 > --------- > > ActiveSupport::CoreExtensions::Hash::Conversions::XML_PARSING.delete('symbol') > ActiveSupport::CoreExtensions::Hash::Conversions::XML_PARSING.delete('yaml') > > Patches > ------- > To aid users who aren't able to upgrade immediately we have provided patches > for the two supported release series. They are in git-am format and consist > of a single changeset. > > * 2-3-xml_parsing.patch - Patch for 2.3 series > * 3-0-xml_parsing.patch - Patch for 3.0 series > * 3-1-xml_parsing.patch - Patch for 3.1 series > * 3-2-xml_parsing.patch - Patch for 3.2 series > > Please note that only the 3.1.x and 3.2.x series are supported at present. > Users of earlier unsupported releases are advised to upgrade as soon as > possible as we cannot guarantee the continued availability of security fixes > for unsupported releases. > > Credits > ------- > This vulnerability was reported to us by numerous people, many thanks to Ben > Murphy, Magnus Holm, Felix Wilhelm, Darcy Laycock, Jonathan Rudenberg, Bryan > Helmkamp, Benoist Claassen and Charlie Somerville for reporting the issue to > us and working with us to ensure the fixes worked. > > > > > > > _______________________________________________ > sipx-users mailing list > sipx-users@list.sipfoundry.org > List Archive: http://list.sipfoundry.org/archive/sipx-users/ _______________________________________________ sipx-users mailing list sipx-users@list.sipfoundry.org List Archive: http://list.sipfoundry.org/archive/sipx-users/