[Pdx-pm] Ruby on Rails exploit
Ronald Chmara
ronabop at gmail.com
Wed Jan 9 03:02:23 PST 2013
There is raw code. That's usually C. Then there are macro pseudo-language
extensions, like C++ and Java, built upon that code. On top of that, there
are scripting things, like Perl, PHP, Python, Ruby, etc. Stacked on top of
that are things like "frameworks" and "MVC" and other useless crap like
Rails and Node.js, which are to programming like an "oil-change technician"
is to a "internal combustion engine engineer".
</rant>
-Bop
On Tue, Jan 8, 2013 at 8:58 PM, Keith Lofstrom <keithl at gate.kl-ic.com>wrote:
> Via my ISP:
>
>
> http://arstechnica.com/security/2013/01/extremely-crtical-ruby-on-rails-bug-threatens-more-than-200000-sites/
>
> https://groups.google.com/forum/#!topic/rubyonrails-security/61bkgvnSGTQ/discussion
>
> I don't run Rails, but a lot of sites do. I wonder if my bank does?
>
> Keith
>
> --
> Keith Lofstrom keithl at keithl.com Voice (503)-520-1993
> _______________________________________________
> Pdx-pm-list mailing list
> Pdx-pm-list at pm.org
> http://mail.pm.org/mailman/listinfo/pdx-pm-list
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.pm.org/pipermail/pdx-pm-list/attachments/20130109/f5785258/attachment.html>
More information about the Pdx-pm-list
mailing list