[Pdx-pm] Ruby on Rails exploit

Ronald Chmara ronabop at gmail.com
Wed Jan 9 03:02:23 PST 2013

There is raw code. That's usually C. Then there are macro pseudo-language
extensions, like C++ and Java, built upon that code. On top of that, there
are scripting things, like Perl, PHP, Python, Ruby, etc. Stacked on top of
that are things like "frameworks" and "MVC" and other useless crap like
Rails and Node.js, which are to programming like an "oil-change technician"
is to a "internal combustion engine engineer".



On Tue, Jan 8, 2013 at 8:58 PM, Keith Lofstrom <keithl at gate.kl-ic.com>wrote:

> Via my ISP:
> http://arstechnica.com/security/2013/01/extremely-crtical-ruby-on-rails-bug-threatens-more-than-200000-sites/
> https://groups.google.com/forum/#!topic/rubyonrails-security/61bkgvnSGTQ/discussion
> I don't run Rails, but a lot of sites do.  I wonder if my bank does?
> Keith
> --
> Keith Lofstrom          keithl at keithl.com         Voice (503)-520-1993
> _______________________________________________
> Pdx-pm-list mailing list
> Pdx-pm-list at pm.org
> http://mail.pm.org/mailman/listinfo/pdx-pm-list
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.pm.org/pipermail/pdx-pm-list/attachments/20130109/f5785258/attachment.html>

More information about the Pdx-pm-list mailing list