[DRE-maint] Bug#961847: ruby-kaminari: CVE-2020-11082
Salvatore Bonaccorso
carnil at debian.org
Sat May 30 10:36:02 BST 2020
Source: ruby-kaminari
Version: 1.0.1-5
Severity: important
Tags: security upstream
Control: found -1 1.0.1-4
Hi,
The following vulnerability was published for ruby-kaminari.
CVE-2020-11082[0]:
| In Kaminari before 1.2.1, there is a vulnerability that would allow an
| attacker to inject arbitrary code into pages with pagination links.
| This has been fixed in 1.2.1.
Note that PARAM_KEY_BLACKLIST was renamed to PARAM_KEY_EXCEPT_LIST in
v1.2.0 upstream to improve the wording (cf. upstream commit
1783c9cf13b24b580497896caa95c6faac10ac50).
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2020-11082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11082
[1] https://github.com/kaminari/kaminari/commit/8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8
[2] https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
More information about the Pkg-ruby-extras-maintainers
mailing list