When print ID can not be found, it can dump out all
session info as well as trace stack info.
http://foo.com/document/print/1 - ok
http://foo.com/document/print/AAAA
http://foo.com/document/print/34343434
Exception thrown
Current user sensetive info available:
user: &id001 !ruby/object:User
attributes:
salt: (Value here)
updated_at: (Time_Stamp here)
delete_after:
security_token:
2a255f443597dc7d791cb7f2bccdbf6c38556f7f
role:
lastname:
firstname:
id: "11"
deleted: "0"
token_expiry: 2006-06-27 23:47:10
verified: "1"
access: "30"
logged_in_at:
salted_password: (Hashed_pass here)
login: tester
created_at: 2006-06-26 23:47:10
email:
errors: !ruby/object:ActiveRecord::Errors
base: *id001
errors: {}
flash: !map:ActionController::Flash::FlashHash {}
Logged In: YES
user_id=1546717
The problem is essentially due to lacking validation of
parameter validation, so when parameter (e.g:document_id,
id) receive unexpected value, exception will be thrown which
is too helpful for an attacker,remedy will be do a proper
input and parameter validation, make a whitelist input and
not dump debugging info to public user,make it only
available to admin or admin user group would be good to go.