FastRuby.io · @FastRuby
31 followers · 111 posts · Server ruby.social

Cybersecurity risks never rest.

⚠️ Stay ahead with our Security Audit service. We’ll identify vulnerabilities and fortify your app's defenses—so you can focus on your core business: fastruby.io/security-audit?utm

#rubyonrails #rubysec #railssec #infosec

Last updated 1 year ago

FastRuby.io · @FastRuby
27 followers · 97 posts · Server ruby.social

There is no greater threat to your Rails app than exploitable code.

ICYMI: Our Rails security webinar is out and free to watch! Check out our new blog to watch it, as well as Ernesto’s slides. Make sure to bookmark our resources linked throughout—you’ll need them!

fastruby.io/blog/fortify-rails

#rubysec #security #infosec #cybersecurity #websecurity

Last updated 1 year ago

FastRuby.io · @FastRuby
27 followers · 85 posts · Server ruby.social
FastRuby.io · @FastRuby
17 followers · 32 posts · Server ruby.social

Is your Ruby on Rails app secure? Check out our latest article on security to ensure your code is protected!

go.fastruby.io/747

#rubysec #infosec #CISO

Last updated 1 year ago

Esparta :ruby: · @esparta
153 followers · 696 posts · Server ruby.social

@wj @p8 ohh yeah, that part is clear, @postmodern. I meant the part of 6.0.x branch with no patches for those CVEs, then warning in GitHub + different interpretation on what is patched at GitHub advisories & - the latter is correct, IMO.

#rails #rubysec

Last updated 2 years ago

Esparta :ruby: · @esparta
153 followers · 696 posts · Server ruby.social

@wj @p8 ITOH reports both, CVE-2023-22792 & CVE-2023-22795 affect all versions, and there's no fix for 6.0.x branch

rubysec.com/advisories/CVE-202
rubysec.com/advisories/CVE-202

Perhaps @postmodern can help here.

Nevertheless, I'd suggest an upgrade to rails 6.0.6.1 because CVE-2023-22794

rubysec.com/advisories/CVE-202

Which is fixed by activerecord 6.0.6.1

my.diffend.io/gems/activerecor

#rubysec #rails

Last updated 2 years ago

postmodern · @postmodern
1031 followers · 877 posts · Server ruby.social

CVE-2022-46648 (ruby-git / git gem) has been added to the ruby-advisory-db, based on the publicly available information, to encourage everyone to upgrade to git 1.13.0. Remember, eval() is evil!
github.com/rubysec/ruby-adviso

#ruby #security #rubysec

Last updated 2 years ago

postmodern · @postmodern
1031 followers · 877 posts · Server ruby.social

Working on adding CVE-2022-46648 (ruby-git / git gem) to ruby-advisory-db based on what I could piece together.
github.com/rubysec/ruby-adviso

#ruby #security #rubysec

Last updated 2 years ago

postmodern · @postmodern
1031 followers · 877 posts · Server ruby.social

Spotted on the birbsite, this looks bad. Someone carelessly used eval() to unquote Strings in the ruby-git gem, instead of like Shellwords.shellsplit. The ruby-git gem is used by many other gems. I don't think the vuln has a public CVE yet nor or a GHSA ID (but I did manually add it to ruby-advisory-db). It was however patched in version 1.13.0, so `bundle up git` if the git gem is in your Gemfile.lock.
twitter.com/ooooooo_q/status/1

#ruby #security #rubysec

Last updated 2 years ago