Security Vulnerabilities in Safe Level, WEBrick, Dl, DNS lookup
One issue is a problem with the safe levels. By setting a safe level, it's possible disallow certain operations and define what data is defined as tainted. Tainted data in Ruby must be explicitly untainted before use. The discovered vulnerabilities are:
- untrace_var is permitted at safe level 4
- $PROGRAM_NAME may be modified at safe level 4
- Insecure methods may be called at safe level 1-3
- Syslog operations are permitted at safe level 4
dlis related to tainted data. The
dllibrary allows to load dynamic libraries and invoke their functions. The
dllibrary doesn't check the taintedness of arguments passed to the calls, which could be used in exploits.
Another vulnerability discovered is in WEBrick, which is susceptible to Denial of Service (DoS) attacks. The problem was caused by the code responsible for splitting HTTP headers - for certain data the regex engine would fail to terminate.
The recently discovered DNS security problem also affected Ruby and was solved by randomizing DNS transaction IDs and source ports.
The solution to these issues is an upgrade to 1.8.6-p286, or 1.8.7-p71 for 1.8.x. For users of Ruby 1.9.x, apparently the currently advised solution is to get the current version in the SVN repository - all revisions after r18423 should be safe.
Finally, a word of caution: the recently discovered problems in the Ruby interpreter were resolved - but the first versions that contained the fixes caused compatibility problems. It pays to properly testdrive the upgrades before putting them into production.
Upgrading to 1.8.7 is also a solution that might cause problems. Using Rails 2.0 with Ruby 1.8.7 can cause problems due to a method ActiveSupport added to String. Ruby 1.8.7 added this method to String by default - yet with slightly different semantics (see InfoQ's article on Ruby's Open Classes for other similar issues). Rails 2.1 works with Ruby 1.8.7.