GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Jul 28, 2020 1:26 am Post subject: [ GLSA 202007-27 ] Haml |
|
|
Gentoo Linux Security Advisory
Title: Haml: Arbitrary code execution (GLSA 202007-27)
Severity: normal
Exploitable: remote
Date: 2020-07-27
Bug(s): #699840
ID: 202007-27
Synopsis
A flaw in Haml allows arbitrary code execution as a result of
improper filtering.
Background
Haml is a templating engine for HTML.
Affected Packages
Package: dev-ruby/haml
Vulnerable: < 5.1.2
Unaffected: >= 5.1.2
Architectures: All supported architectures
Description
It was discovered that Haml was not correctly filtering out special
characters which may be used for attributes.
Impact
A remote attacker could possibly execute arbitrary code with the
privileges of the process or cause a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All Haml users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-ruby/haml-5.1.2"
|
References
CVE-2017-1002201
|
|