Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade to Paperclip 5.2.0 #8558

Merged
merged 1 commit into from Jan 24, 2018
Merged

Upgrade to Paperclip 5.2.0 #8558

merged 1 commit into from Jan 24, 2018

Conversation

jankeesvw
Copy link
Contributor

@jankeesvw jankeesvw commented Jan 24, 2018

This addresses CVE-2017-0889

Paperclip ruby gem version 3.1.4 and later suffers from
a Server-SIde Request Forgery (SSRF) vulnerability in
the Paperclip::UriAdapter class. Attackers may be able
to access information about internal network resources.

This addresses CVE-2017-0889

Paperclip ruby gem version 3.1.4 and later suffers from 
a Server-SIde Request Forgery (SSRF) vulnerability in 
the Paperclip::UriAdapter class. Attackers may be able 
to access information about internal network resources.

https://nvd.nist.gov/vuln/detail/CVE-2017-0889
@bbonislawski
Copy link
Contributor

Thanks @jankeesvw for contribution. I'll merge it as soon as tests will pass

@bbonislawski bbonislawski merged commit 71c9b11 into spree:master Jan 24, 2018
@jankeesvw jankeesvw deleted the patch-1 branch January 24, 2018 13:46
@jankeesvw
Copy link
Contributor Author

Thanks for the quick action @bbonislawski ❤️

@bbonislawski
Copy link
Contributor

@jankeesvw I've created backport for 3-3 and 3-4. How does situation look with paperclip 4.x?(Spree 3.1 and 3.2 are linked to 4.x)?

@jankeesvw
Copy link
Contributor Author

There is no patch for Paperclip 4.x yet as far as I know, I referenced the pull request which fixed this CVE in the body of this PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants