Just in case you guys hadn't seen this

http://weblog.rubyonrails.com/2008/10/19/response-splitting-risk

-----------
The Ruby HTTP libraries used by Rails do not perform any santization
of the values of their HTTP Headers.
This can lead to Response Splitting and Header Injection attacks in
certain circumstances where user-provided values are written into
response headers. These malformed values can be used to set custom
cookies, and forge fake responses to users if your application uses
any of the user submitted parameters to construct HTTP headers without
sanitizing.
----------

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"merb" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at http://groups.google.com/group/merb?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to