Egor Homakov recently brought to my attention a slight problem with how Paperclip handles some content type validations. Namely, if an attacker puts an entire HTML page into the EXIF tag of a completely valid JPEG and named the file âgotcha.htmlâ, they could potentially trick users into an XSS vulnerability. Now, this is kind of a convoluted means of attacking. It involves: A server thatâs running
{{#tags}}- {{label}}
{{/tags}}