Hi Sheldon,
* Sheldon Hearn <[EMAIL PROTECTED]> [2007-10-22 14:22]:
> On Monday 22 October 2007 13:58:43 Nico Golde wrote:
> > > The bad news is, it looks like CVE-2007-3227 is only fixed properly
> > > in rails-1.2.5:
> > >
> > > http://groups.google.com/group/rubyonrails-security/browse_thread/t
> > >hread/225dcc61aaefad42
> >
> > Why do you think so?
> 
> I think so because DHH is a core Rails developer, and his post said that 
> 1.2.5 closes a JSON XSS vulnerability, and that we should see 
> CVE-2007-3227 for more information on the problem.
[...] 
> "The rails core team has released ruby on rails 1.2.5 to address a 
>  potential XSS exploit with our json serialization. The CVE Identifier 
>  for this problem is CVE-2007-3227"
> 
> In other words, I don't think rails-1.2.4 fully addressed the issue.

Huh? Who said this? We have 1.2.4 but we ship an extra patch 
which is not included in 1.2.4 to fix this so I don't see 
the point.
Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpQDYOMTPGO6.pgp
Description: PGP signature

Reply via email to