Haml: Arbitrary code execution — GLSA 202007-27

A flaw in Haml allows arbitrary code execution as a result of improper filtering.

Affected packages

dev-ruby/haml on all architectures
Affected versions < 5.1.2
Unaffected versions >= 5.1.2

Background

Haml is a templating engine for HTML.

Description

It was discovered that Haml was not correctly filtering out special characters which may be used for attributes.

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Haml users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-ruby/haml-5.1.2"
 

References

Release date
July 27, 2020

Latest revision
July 27, 2020: 1

Severity
normal

Exploitable
remote

Bugzilla entries