e9c9fef0c1
# 1.8.0 - Security: implement standards compliant cookie handling by adding a dependency on http-cookie. This breaks compatibility, but was necessary to address a session fixation / cookie disclosure vulnerability. (#369 / CVE-2015-1820) Previously, any Set-Cookie headers found in an HTTP 30x response would be sent to the redirection target, regardless of domain. Responses now expose a cookie jar and respect standards compliant domain / path flags in Set-Cookie headers.
5 lines
246 B
Text
5 lines
246 B
Text
$NetBSD: distinfo,v 1.3 2015/03/28 04:12:16 taca Exp $
|
|
|
|
SHA1 (rest-client-1.8.0.gem) = 271b57e37e69afbc1a02b455391d171379bdda8a
|
|
RMD160 (rest-client-1.8.0.gem) = be9fab9a89955c9db281adbe9b1692d9f17a8b15
|
|
Size (rest-client-1.8.0.gem) = 124928 bytes
|