Two new Rails vulnerabilities were reported today:

  * Manual options are not escaped in select():
    
http://groups.google.com/group/rubyonrails-security/browse_thread/thread/9da0c515a6c4664

  * Some operations on SafeBuffer mistakenly return strings marked as 
html_safe:
     
http://groups.google.com/group/rubyonrails-security/browse_thread/thread/edd28f1e3d04e913

This release checks for these issues, amongst other changes.

Changes since 1.4.0:

  * Add version check for SafeBuffer vulnerability
  * Add check for select vulnerability in Rails 3
  * select() is no longer considered safe in Rails 2
  * Add check for skipping CSRF protection with a blacklist
  * Add JSON report format
  * Model#id should not be considered XSS
  * Standardize methods to check for SQL injection
  * Fix Rails 2 route parsing issue with nested routes

It is VERY likely some of these changes will introduce new warnings or 
disregard previous warnings (hopefully only false positives).

For more information: 
http://brakemanscanner.org/blog/2012/03/01/brakeman-1-dot-5-0-released/

Reply via email to