Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
O
OHR Support
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
97
Issues
97
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
Wiki
Wiki
image/svg+xml
Discourse
Discourse
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Commits
Issue Boards
Open sidebar
Projects
OHR Support
Commits
6ece1687
Commit
6ece1687
authored
Jan 06, 2013
by
Holger Just
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fix XSS vulnerabilities in Rails (CVE-2012-3464, CVE-2012-3465) #1113 #1114
parent
6d87b8b2
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
64 additions
and
0 deletions
+64
-0
10-patches.rb
config/initializers/10-patches.rb
+64
-0
No files found.
config/initializers/10-patches.rb
View file @
6ece1687
...
...
@@ -326,3 +326,67 @@ module ActiveRecord
end
end
end
# Backported fix for CVE-2012-3465
# https://groups.google.com/d/msg/rubyonrails-security/FgVEtBajcTY/tYLS1JJTu38J
# TODO: Remove this once we are on Rails >= 3.2.8
require
'action_view/helpers/sanitize_helper'
module
ActionView::Helpers::SanitizeHelper
def
strip_tags
(
html
)
self
.
class
.
full_sanitizer
.
sanitize
(
html
)
end
end
# Backported fix for CVE-2012-3464
# https://groups.google.com/d/msg/rubyonrails-security/kKGNeMrnmiY/r2yM7xy-G48J
# TODO: Remove this once we are on Rails >= 3.2.8
require
'active_support/core_ext/string/output_safety'
class
ERB
module
Util
HTML_ESCAPE
[
"'"
]
=
'''
if
RUBY_VERSION
>=
'1.9'
# A utility method for escaping HTML tag characters.
# This method is also aliased as <tt>h</tt>.
#
# In your ERB templates, use this method to escape any unsafe content. For example:
# <%=h @person.name %>
#
# ==== Example:
# puts html_escape("is a > 0 & a < 10?")
# # => is a > 0 & a < 10?
def
html_escape
(
s
)
s
=
s
.
to_s
if
s
.
html_safe?
s
else
s
.
gsub
(
/[&"'><]/
,
HTML_ESCAPE
).
html_safe
end
end
else
def
html_escape
(
s
)
#:nodoc:
s
=
s
.
to_s
if
s
.
html_safe?
s
else
s
.
gsub
(
/[&"'><]/n
)
{
|
special
|
HTML_ESCAPE
[
special
]
}.
html_safe
end
end
end
# Aliasing twice issues a warning "discarding old...". Remove first to avoid it.
remove_method
(
:h
)
alias
h
html_escape
module_function
:h
singleton_class
.
send
(
:remove_method
,
:html_escape
)
module_function
:html_escape
end
end
require
'action_view/helpers/tag_helper'
module
ActionView::Helpers::TagHelper
def
escape_once
(
html
)
ActiveSupport
::
Multibyte
.
clean
(
html
.
to_s
).
gsub
(
/[\"\'><]|&(?!([a-zA-Z]+|(#\d+));)/
)
{
|
special
|
ERB
::
Util
::
HTML_ESCAPE
[
special
]
}
end
end
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment