2013-01-08 Instructure Advisory IAC94807 - Rails XML Parsing Vulnerability
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
SECURITY UPDATE |
Release Date: | 2013-01-08 (Last update can be found below the document title) |
Description: | Code Injection Attack in Rails Library |
Criticality Level: | Highly Critical ( Less Critical < Critical < Moderately Critical < Highly Critical ) |
Impact: |
|
Systems Affected: | Canvas LMS |
Solution Status: | Patch |
Relevant Changesets: | disable XML params parser · instructure/canvas-lms@0e0190f · GitHub |
Summary:
An XML parameter parsing vulnerability was discovered in the Ruby on Rails 2.3.x library that Canvas uses. Canvas does not use XML parameter parsing, but is still vulnerable without the fix applied. Further information is available at https://groups.google.com/d/topic/rubyonrails-security/61bkgvnSGTQ/...
Status:
Fixed in Canvas Cloud. Users of Canvas CV are encouraged to either update to the most recent stable code or apply the patch manually immediately.