-
Notifications
You must be signed in to change notification settings - Fork 22.2k
Comparing changes
Open a pull request
base repository: rails/rails
base: v5.2.4.1
head repository: rails/rails
compare: v5.2.4.5
- 16 commits
- 48 files changed
- 9 contributors
Commits on Mar 19, 2020
-
Fix possible XSS vector in JS escape helper
This commit escapes dollar signs and backticks to prevent JS XSS issues when using the `j` or `javascript_escape` helper CVE-2020-5267
Configuration menu - View commit details
-
Copy full SHA for b5aeef5 - Browse repository at this point
Copy the full SHA b5aeef5View commit details -
Configuration menu - View commit details
-
Copy full SHA for 4dcc543 - Browse repository at this point
Copy the full SHA 4dcc543View commit details
Commits on May 14, 2020
-
Configuration menu - View commit details
-
Copy full SHA for e8df564 - Browse repository at this point
Copy the full SHA e8df564View commit details
Commits on May 15, 2020
-
Return self when calling #each, #each_pair, and #each_value instead o…
…f the raw @parameters hash [CVE-2020-8164]
Configuration menu - View commit details
-
Copy full SHA for 7a3ee4f - Browse repository at this point
Copy the full SHA 7a3ee4fView commit details -
activesupport: Avoid Marshal.load on raw cache value in MemCacheStore
Dalli is already being used for marshalling, so we should also rely on it for unmarshalling. Since Dalli tags the cache value as marshalled it can avoid unmarshalling a raw string which might have come from an untrusted source. [CVE-2020-8165]
Configuration menu - View commit details
-
Copy full SHA for f7e077f - Browse repository at this point
Copy the full SHA f7e077fView commit details -
activesupport: Deprecate Marshal.load on raw cache read in RedisCache…
…Store The same value for the `raw` option should be provided for both reading and writing to avoid Marshal.load being called on untrusted data. [CVE-2020-8165]
Configuration menu - View commit details
-
Copy full SHA for 467e339 - Browse repository at this point
Copy the full SHA 467e339View commit details -
HMAC raw CSRF token before masking it, so it cannot be used to recons…
…truct a per-form token [CVE-2020-8166]
Configuration menu - View commit details
-
Copy full SHA for d124f19 - Browse repository at this point
Copy the full SHA d124f19View commit details -
Configuration menu - View commit details
-
Copy full SHA for fbc7bec - Browse repository at this point
Copy the full SHA fbc7becView commit details -
Configuration menu - View commit details
-
Copy full SHA for 9cb66f6 - Browse repository at this point
Copy the full SHA 9cb66f6View commit details
Commits on May 18, 2020
-
Configuration menu - View commit details
-
Copy full SHA for 3c806b9 - Browse repository at this point
Copy the full SHA 3c806b9View commit details -
Configuration menu - View commit details
-
Copy full SHA for 559cce2 - Browse repository at this point
Copy the full SHA 559cce2View commit details -
Configuration menu - View commit details
-
Copy full SHA for 7b5cc5a - Browse repository at this point
Copy the full SHA 7b5cc5aView commit details
Commits on Sep 9, 2020
-
Fix XSS vulnerability in
translatehelperPrior to this commit, when a translation key indicated that the translation text was HTML, the value returned by `I18n.translate` would always be marked as `html_safe`. However, the value returned by `I18n.translate` could be an untrusted value directly from `options[:default]`. This commit ensures values directly from `options[:default]` are not marked as `html_safe`.
Configuration menu - View commit details
-
Copy full SHA for aaa7ab1 - Browse repository at this point
Copy the full SHA aaa7ab1View commit details -
Configuration menu - View commit details
-
Copy full SHA for 404ad9e - Browse repository at this point
Copy the full SHA 404ad9eView commit details
Commits on Feb 10, 2021
-
Fix possible DoS vector in PostgreSQL money type
Carefully crafted input can cause a DoS via the regular expressions used for validating the money format in the PostgreSQL adapter. This patch fixes the regexp. Thanks to @dee-see from Hackerone for this patch! [CVE-2021-22880]
2Configuration menu - View commit details
-
Copy full SHA for bf0ef9d - Browse repository at this point
Copy the full SHA bf0ef9dView commit details -
Configuration menu - View commit details
-
Copy full SHA for dc7364b - Browse repository at this point
Copy the full SHA dc7364bView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v5.2.4.1...v5.2.4.5