Hey Everyone,
Make sure that you've updated your Rails versions due to multiple critical security vulnerabilities (CVE-2013-0155 and CVE-2013-0156)
We were able to execute remote code (create files, delete files, etc.) on some of our staging boxes via the exploit. I cannot express how critical these updates are.
On top of that now, thanks to @theDoug I was linked this url which notes that a bunch of gems also have the same vulnerability:
I've also heard word that Grape is vulnerable:
So make sure to update the above gems. If anyone hears of any other gems feel free to reply to this.
A minor note, @nathany and @fzeisler mentioned to me (while at @exchangejs) that there are possible issues regarding json when upgrading to the patch level. So be aware of that. If either of you could elaborate on that it might help someone else on the thread.
If you're curious about the exploit themselves, here's a great detailed discussion (and POC):
I'm not worried about linking to the above links as if you google the exploit numbers on
http://weblog.rubyonrails.org/ you'll get end up at the same place.
Ry