@@ -33,41 +33,6 @@ advisory:
33
33
and attempts to work with it, which may result in dangerous behavior
34
34
and code execution.
35
35
36
- ### PoC
37
-
38
- 
39
-
40
- In the test scenario we choose the demo app and the review
41
- resource which has a polymorphic reviewable field.
42
-
43
- 
44
-
45
- Intercepting the request and switching the review[reviewable_type]
46
- from “Fish” to “File” which is a real class inside Rails
47
-
48
- 
49
-
50
- Corrupting the database with unusable classes will cause a crash
51
- at the application while viewing the new record or the index
52
- view (partial DoS)
53
-
54
- 
55
-
56
- Manual delete the corrupted resource in order to recover the
57
- applications functionality
58
-
59
- 
60
-
61
- Of course it is possible to use other class names or namespaces. The
62
- local development environment displays the backend error message
63
- when visiting a corrupted record. Avo is trying to apply a scope to
64
- this class that does not exist.
65
-
66
- 
67
-
68
- Specifying an invalid class name in the parameter will cause the
69
- application to crash again while trying constanize the provided string
70
-
71
36
### Impact
72
37
73
38
The final exploitation of this vulnerability requires more time than
0 commit comments