It goes beyond that. To quote Paul Legato (his comments can be seen in their entirety here: http://www.ruby-forum.com/topic/76671\)
"The nondisclosure policy in handling this vulnerability has
seriously jeopardized our (and many other people's) ability to use Rails
in a commercial environment, so we would like to suggest that it be
changed.
The core issue is that releasing a patch to fix a critical security
vulnerability without telling anyone what the vulnerability is does very
little good as a knowledgeable cracker can just SVN diff the new version
with the old one and peruse that patch to have an exploit ready to go."
I have software running in environments where it has a real effect on the business operations and their bottom line. I have Ruby software running in financial environments and for a Fortune 500 financial company.
I don't use Rails for these things, so this vulnerability doesn't directly affect me, but the way that it has been handled certainly does, and here's why:
One of my pieces of software is a custom data storage and retrieval system for a company that handles products that I bet most of you reading this have seen or maybe even posessed before. They load into this system inventory and product data as well as contact and sourcing data. The availability of the system is very important with regard to their ability to efficiently serve their customers.
Imagine the president of this company, who knows that his software is implemented with Ruby, hears about this critical, greivous security issue with Ruby/Rails. He goes and finds the announcement, which says nothing, really, except to trust you and upgrade now. So, he comes to me with a great deal of concern and asks me about it.
--Is his software vulnerable?
++Well, no, because it's not using Rails.
--Okay, well, what is the vulnerability?
++I have no idea.
--Okay, then how do you know that your code doesn't have the same problem? It's written with Ruby, too, right?
++Yes, but it's not Rails.
--So? If you don't know what the vulnerability actually is, how do you know your code doesn't have it, too? Maybe it's in some other library that both Rails and your code uses or something.
++You're right. I have no idea.
Yeah, there are logical ways out of a conversation like that, but when dealing with situations where the decision to use Ruby at all on a potentially sensitive business application could come under question, this "we aren't saying a word except that it's horrible, but trust us" approach by the Rails core team doesn't, in the long run, help themselves or any of the rest of us.
No imagine that it's not a $5 million a year company doing the questioning, but the security team of that Fortune 500 financial company (a very conservative market) who is currently performing a mandatory security audit? The lack of a clear announcement of the vulnerability does little to enhance the security of Rails users, and does a lot to create doubt and suspicion in the minds of people who have the power to make decisions about whether Ruby, in general, is an appropriate tool for their enterprise.
Kirk Haines
···
On Thu, 10 Aug 2006, David Heinemeier Hansson wrote:
In other words, if you lose your entire database two hours after the
announcement (because it was announced at 2am local time, say), it's
pretty cold comfort that the vulnerability was openly discussed and
evaluated according to all the best practices of the open-source
community.
What Matthew said. We'll release the details once everyone has had a
fair chance to upgrade.