I like the Moderation Log for this post:
Story: Rails Asset Pipeline Directory Traversal Vulnerability (CVE-2018-3760) Action: changed tags from “ruby” to “ruby security web” Reason: Adding a couple tags… after checking the Lobsters production.rb.
This is the first time Heroku has ever been able to detect configuration options and block a deploy for a vulnerability like this.
Is there a particular reason for it being a first? Also thanks for the write up and the fixes!
We’ve never had the capability before. I just added the code to detect configuration via rails runner recently https://github.com/heroku/heroku-buildpack-ruby/pull/758.
rails runner
I like the Moderation Log for this post:
This is the first time Heroku has ever been able to detect configuration options and block a deploy for a vulnerability like this.
Is there a particular reason for it being a first? Also thanks for the write up and the fixes!
We’ve never had the capability before. I just added the code to detect configuration via
rails runnerrecently https://github.com/heroku/heroku-buildpack-ruby/pull/758.