Versions Affected: All.
Fixed Versions: 3.0.4, 2.3.11
An attacker could specify a malicious name or email value which could
enable an XSS attack. All users running an affected release should
either upgrade or use one of the work arounds immediately.
The 3.0.4 and 2.3.11 releases are available at the normal locations.
The simplest work around is to specify :encode => :hex instead, for
<%= mail_to user.email, user.name, :encode => :hex %>
passed to both values.
To aid users who aren't able to upgrade immediately we have provided a
patch for the supported release series. It is in git-am format and
consists of a single changeset.
* 3-0-mailto.patch - Patch for 3.0 series
* 2-3-mailto.patch - Patch for 2.3 series
Please note that only the 2.3.x and 3.0.x series are supported at
present. Users of earlier unsupported releases are advised to upgrade
as soon as possible.
Thanks to Brendan Coles of IT Security Solutions and Rick Olson of
Github reporting the vulnerability to us.