2013-01-08 Instructure Advisory IAC94807 - Rails XML Parsing Vulnerability

jordan
Instructure Alumni
Instructure Alumni
0
504

    SECURITY UPDATE

Canvas + Logo transparent (WHITE)- 300px.png

  Release Date:2013-01-08  (Last update can be found below the document title)
  Description:Code Injection Attack in Rails Library
  Criticality Level:Highly Critical ( Less Critical < Critical < Moderately Critical < Highly Critical )
  Impact:
  • Manipulation of data
  • Exposure of sensitive information
  • Privilege escalation
  • Arbitrary code execution
  • Denial of Service
  Systems Affected: Canvas LMS
  Solution Status:Patch
  Relevant Changesets:

disable XML params parser · instructure/canvas-lms@0e0190f · GitHub 


Summary:

An XML parameter parsing vulnerability was discovered in the Ruby on Rails 2.3.x library that Canvas uses. Canvas does not use XML parameter parsing, but is still vulnerable without the fix applied. Further information is available at https://groups.google.com/d/topic/rubyonrails-security/61bkgvnSGTQ/...

Status:

Fixed in Canvas Cloud. Users of Canvas CV are encouraged to either update to the most recent stable code or apply the patch manually immediately.