Source: ruby-kaminari Version: 1.0.1-5 Severity: important Tags: security upstream Control: found -1 1.0.1-4
Hi, The following vulnerability was published for ruby-kaminari. CVE-2020-11082[0]: | In Kaminari before 1.2.1, there is a vulnerability that would allow an | attacker to inject arbitrary code into pages with pagination links. | This has been fixed in 1.2.1. Note that PARAM_KEY_BLACKLIST was renamed to PARAM_KEY_EXCEPT_LIST in v1.2.0 upstream to improve the wording (cf. upstream commit 1783c9cf13b24b580497896caa95c6faac10ac50). If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-11082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11082 [1] https://github.com/kaminari/kaminari/commit/8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8 [2] https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433 Please adjust the affected versions in the BTS as needed. Regards, Salvatore