1. 10
  1.  

  2. 3

    I like the Moderation Log for this post:

    Story: Rails Asset Pipeline Directory Traversal Vulnerability (CVE-2018-3760)
    Action: changed tags from “ruby” to “ruby security web”
    Reason: Adding a couple tags… after checking the Lobsters production.rb.

    1. 2

      This is the first time Heroku has ever been able to detect configuration options and block a deploy for a vulnerability like this.

      1. 1

        Is there a particular reason for it being a first? Also thanks for the write up and the fixes!

        1. 2

          Is there a particular reason for it being a first? Also thanks for the write up and the fixes!

          We’ve never had the capability before. I just added the code to detect configuration via rails runner recently https://github.com/heroku/heroku-buildpack-ruby/pull/758.