Haml: Arbitrary code execution A flaw in Haml allows arbitrary code execution as a result of improper filtering. haml 2020-07-27 2020-07-27 699840 remote 5.1.2 5.1.2

Haml is a templating engine for HTML.

It was discovered that Haml was not correctly filtering out special characters which may be used for attributes.

A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

There is no known workaround at this time.

All Haml users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-ruby/haml-5.1.2"
CVE-2017-1002201 BlueKnight sam_c