You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: advisories/_posts/2023-06-06-CVE-2023-34102.md
+32-14
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ advisory:
14
14
description: |
15
15
### Summary
16
16
17
-
"The polymorphic field type stores the classes to operate on when updating
17
+
The polymorphic field type stores the classes to operate on when updating
18
18
a record with user input, and does not validate them in the back end.
19
19
This can lead to unexpected behavior, remote code execution, or
20
20
application crashes when viewing a manipulated record.
@@ -35,20 +35,38 @@ advisory:
35
35
36
36
### PoC
37
37
38
-
\n_In the test scenario we choose the demo app and the review resource which has a polymorphic
the request and switching the review[reviewable_type] from “Fish”
41
-
to “File” which is a real class inside Rails_\n_Corrupting
42
-
the database with unusable classes will cause a crash at the
43
-
application while viewing the new record or the index
delete the corrupted resource in order to recover the applications functionality_\n\n\n_Of
46
-
course it is possible to use other class names or namespaces. The
Of course it is possible to use other class names or namespaces. The
47
62
local development environment displays the backend error message
48
63
when visiting a corrupted record. Avo is trying to apply a scope to
49
-
this class that does not exist._\n\n\n_Specifying
50
-
an invalid class name in the parameter will cause the application
51
-
to crash again while trying constanize the provided string_
0 commit comments