summaryrefslogtreecommitdiff
path: root/www
diff options
context:
space:
mode:
authortaca <taca@pkgsrc.org>2012-08-12 09:46:45 +0000
committertaca <taca@pkgsrc.org>2012-08-12 09:46:45 +0000
commitcf9adc3d59b70a707cb9b83f5cd8747d2219db90 (patch)
tree4401c7ec1e8768cf1f76854c56083de5006099f9 /www
parent6586b61ea9d9a8f5ac905435bd12e6a2fe2a0928 (diff)
downloadpkgsrc-cf9adc3d59b70a707cb9b83f5cd8747d2219db90.tar.gz
Update ruby-actionpack3 to 3.0.17
## Rails 3.0.17 (Aug 9, 2012) * There is an XSS vulnerability in the strip_tags helper in Ruby on Rails, the helper doesn't correctly handle malformed html. As a result an attacker can execute arbitrary javascript through the use of specially crafted malformed html. *Marek from Nethemba (www.nethemba.com) & Santiago Pastorino* * When a "prompt" value is supplied to the `select_tag` helper, the "prompt" value is not escaped. If untrusted data is not escaped, and is supplied as the prompt value, there is a potential for XSS attacks. Vulnerable code will look something like this: select_tag("name", options, :prompt => UNTRUSTED_INPUT) *Santiago Pastorino*
Diffstat (limited to 'www')
-rw-r--r--www/ruby-actionpack3/distinfo8
1 files changed, 4 insertions, 4 deletions
diff --git a/www/ruby-actionpack3/distinfo b/www/ruby-actionpack3/distinfo
index 120c85bac85..27645533848 100644
--- a/www/ruby-actionpack3/distinfo
+++ b/www/ruby-actionpack3/distinfo
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.15 2012/07/31 12:24:29 taca Exp $
+$NetBSD: distinfo,v 1.16 2012/08/12 09:46:45 taca Exp $
-SHA1 (actionpack-3.0.16.gem) = e07eb21b957a1d3fc08c8dd49c709cebe5274625
-RMD160 (actionpack-3.0.16.gem) = 9bcb8da14d62e84dfc8a181872634f1c5f2a3eec
-Size (actionpack-3.0.16.gem) = 355328 bytes
+SHA1 (actionpack-3.0.17.gem) = d376046160772c1ef74804ed24173c998482b7b7
+RMD160 (actionpack-3.0.17.gem) = 498c240a97f86c3f6f4a7d336a5d16952d513aba
+Size (actionpack-3.0.17.gem) = 355840 bytes