<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>i3m Blog &#187; ruby</title>
	<atom:link href="http://internal3m.com/CMS/Wordpress/tag/ruby/feed/" rel="self" type="application/rss+xml" />
	<link>http://internal3m.com/CMS/Wordpress</link>
	<description></description>
	<lastBuildDate>Thu, 21 Apr 2016 14:54:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>Critical Ruby on Rails bug exploited in wild, hacked servers join botnet</title>
		<link>http://internal3m.com/CMS/Wordpress/2013/05/29/critical-ruby-on-rails-bug-exploited-in-wild-hacked-servers-join-botnet/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2013/05/29/critical-ruby-on-rails-bug-exploited-in-wild-hacked-servers-join-botnet/#comments</comments>
		<pubDate>Wed, 29 May 2013 17:49:14 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[Internet News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[ruby]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=2006</guid>
		<description><![CDATA[Attackers are exploiting an extremely critical vulnerability in the Ruby on Rails framework to commandeer servers and make them part of a malicious network of hacked machines, a security researcher said. Ars first warned of the threat in early January, shortly after Rails maintainers issued a patch for the vulnerability. Ars warned at the time <a href='http://internal3m.com/CMS/Wordpress/2013/05/29/critical-ruby-on-rails-bug-exploited-in-wild-hacked-servers-join-botnet/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://internal3m.com/CMS/Wordpress/wp-content/uploads/2013/05/150px-Ruby_on_Rails.svg_.png"><img class="aligncenter size-full wp-image-2007" alt="150px-Ruby_on_Rails.svg" src="http://internal3m.com/CMS/Wordpress/wp-content/uploads/2013/05/150px-Ruby_on_Rails.svg_.png" width="150" height="194" /></a></p>
<p>Attackers are exploiting an extremely critical vulnerability in the Ruby on Rails framework to commandeer servers and make them part of a malicious network of hacked machines, a security researcher said.</p>
<p>Ars first warned of the threat in early January, shortly after Rails maintainers issued a patch for the vulnerability. Ars warned at the time that the vulnerability gave attackers the ability to remotely execute malicious code on underlying servers. Criminals&#8217; success in exploiting the bug to make vulnerable machines join a botnet suggests that many server administrators still haven&#8217;t installed the critical update more than four months after it was issued.</p>
<p>Servers that have been exploited are infected with software that caused them to join an Internet Relay Chat (IRC) channel on one of at least two servers, security researcher Jeff Jarmoc said in a post published Tuesday to his personal website. Attackers can force servers to download and execute malicious code and join new IRC channels from there.</p>
<p><strong>MORE:</strong>   <a href="http://arstechnica.com/security/2013/05/critical-ruby-on-rails-bug-exploited-in-wild-hacked-servers-join-botnet/">Critical Ruby on Rails bug exploited in wild, hacked servers join botnet | Ars Technica</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2013/05/29/critical-ruby-on-rails-bug-exploited-in-wild-hacked-servers-join-botnet/feed/</wfw:commentRss>
		<slash:comments>241</slash:comments>
		</item>
	</channel>
</rss>
