Hi, Rails Experts!

I think this is important so please read this message.

There is a DoS for Ruby on Rails that is easily exploitable.
The attack involves sending a malformed xml document in
an HTTP request.


There has been an exploitable spec in the Ruby on Rails
which allows:

Anyone on the Internet to...
Send a single HTTP request to...
Any Rails Web application program using...
Rexml parsing with...
A malformed Xml document that...
Causes the Ruby process to go into a 99% CPU heavily-loaded loop.


What happens is that the Xml document (included DTD) is given as:

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE foobar [
      <!ENTITY x0 "hello">
      <!ENTITY x1 "&x0;&x0;">
      <!ENTITY x2 "&x1;&x1;">
      <!ENTITY x3 "&x2;&x2;">
---- repeat 100 times -----------------
      <!ENTITY x100 "&x99;&x99;">
]>
<SOAP-ENV:Envelope xmlns:xsd="http://www.w3.org/2001/XMLSchema";

xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/";
                 xmlns:xsi="http://www.w3.org/2001/XMLSchema-
instance">
      <SOAP-ENV:Body>
              <ns1:echo xmlns:ns1="aaa"><b>&x100;</b>
              </ns1:echo>
      </SOAP-ENV:Body>
</SOAP-ENV:Envelope>




And this causes REXML to go into an heavily-loaded xml parsing loop.

Currently, as far as I know, Rails 1.1.x and Rails 1.2.x are affected.
Maybe, all of the Rails based Web application.

And Mongrel, Lighttpd + FastCGI, and WEBrick are vulnerable.



I'm looking for a hot fix release, or a avoidance technique.
(For example, How to disable the DTD for Rails XML Parser.)

Please any one help me!


---
3arrows


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Ruby 
on Rails: Core" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/rubyonrails-core?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to