@@ -27,41 +27,6 @@ description: |
2727 and attempts to work with it, which may result in dangerous behavior
2828 and code execution.
2929
30- ### PoC
31-
32- 
33-
34- In the test scenario we choose the demo app and the review
35- resource which has a polymorphic reviewable field.
36-
37- 
38-
39- Intercepting the request and switching the review[reviewable_type]
40- from “Fish” to “File” which is a real class inside Rails
41-
42- 
43-
44- Corrupting the database with unusable classes will cause a crash
45- at the application while viewing the new record or the index
46- view (partial DoS)
47-
48- 
49-
50- Manual delete the corrupted resource in order to recover the
51- applications functionality
52-
53- 
54-
55- Of course it is possible to use other class names or namespaces. The
56- local development environment displays the backend error message
57- when visiting a corrupted record. Avo is trying to apply a scope to
58- this class that does not exist.
59-
60- 
61-
62- Specifying an invalid class name in the parameter will cause the
63- application to crash again while trying constanize the provided string
64-
6530 ### Impact
6631
6732 The final exploitation of this vulnerability requires more time than
0 commit comments