bundler-audit 0.1.1 → 0.1.2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (63) hide show
  1. data/.gitignore +3 -0
  2. data/.gitmodules +3 -0
  3. data/.travis.yml +4 -0
  4. data/ChangeLog.md +13 -0
  5. data/Gemfile +12 -0
  6. data/README.md +3 -37
  7. data/Rakefile +20 -49
  8. data/bundler-audit.gemspec +7 -0
  9. data/data/ruby-advisory-db/.rspec +1 -0
  10. data/data/ruby-advisory-db/README.md +64 -0
  11. data/data/ruby-advisory-db/gems/actionpack/2012-1099.yml +23 -0
  12. data/data/{bundler/audit/rails → ruby-advisory-db/gems/actionpack}/2012-3424.yml +10 -6
  13. data/data/ruby-advisory-db/gems/actionpack/2012-3463.yml +20 -0
  14. data/data/ruby-advisory-db/gems/actionpack/2012-3465.yml +20 -0
  15. data/data/{bundler/audit/rails → ruby-advisory-db/gems/actionpack}/2013-0156.yml +5 -3
  16. data/data/ruby-advisory-db/gems/activerecord/2012-2660.yml +21 -0
  17. data/data/ruby-advisory-db/gems/activerecord/2012-2661.yml +19 -0
  18. data/data/{bundler/audit/rails → ruby-advisory-db/gems/activerecord}/2013-0155.yml +6 -4
  19. data/data/{bundler/audit/rails → ruby-advisory-db/gems/activerecord}/2013-0276.yml +5 -3
  20. data/data/{bundler/audit/rails → ruby-advisory-db/gems/activerecord}/2013-0277.yml +5 -3
  21. data/data/ruby-advisory-db/gems/activesupport/2012-1098.yml +20 -0
  22. data/data/ruby-advisory-db/gems/activesupport/2012-3464.yml +20 -0
  23. data/data/{bundler/audit/rails → ruby-advisory-db/gems/activesupport}/2013-0333.yml +5 -3
  24. data/data/ruby-advisory-db/gems/devise/2013-0233.yml +18 -0
  25. data/data/ruby-advisory-db/gems/gtk2/2007-6183.yml +18 -0
  26. data/data/{bundler/audit → ruby-advisory-db/gems}/json/2013-0269.yml +4 -2
  27. data/data/ruby-advisory-db/gems/mail/2011-0739.yml +19 -0
  28. data/data/ruby-advisory-db/gems/mail/2012-2139.yml +11 -0
  29. data/data/ruby-advisory-db/gems/mail/2012-2140.yml +11 -0
  30. data/data/ruby-advisory-db/gems/multi_xml/2013-0175.yml +14 -0
  31. data/data/ruby-advisory-db/gems/newrelic_rpm/2013-0284.yml +15 -0
  32. data/data/ruby-advisory-db/gems/nori/2013-0285.yml +17 -0
  33. data/data/ruby-advisory-db/gems/omniauth-oauth2/2012-6134.yml +14 -0
  34. data/data/ruby-advisory-db/gems/rack-cache/2012-267.yml +16 -0
  35. data/data/{bundler/audit → ruby-advisory-db/gems}/rack/2013-0263.yml +9 -8
  36. data/data/ruby-advisory-db/gems/rdoc/2013-0256.yml +25 -0
  37. data/data/ruby-advisory-db/spec/advisory_example.rb +80 -0
  38. data/data/ruby-advisory-db/spec/gems_spec.rb +8 -0
  39. data/data/ruby-advisory-db/spec/spec_helper.rb +1 -0
  40. data/gemspec.yml +1 -6
  41. data/lib/bundler/audit/advisory.rb +13 -1
  42. data/lib/bundler/audit/cli.rb +17 -6
  43. data/lib/bundler/audit/database.rb +1 -30
  44. data/lib/bundler/audit/version.rb +1 -1
  45. data/spec/advisory_spec.rb +1 -1
  46. data/spec/bundle/secure/Gemfile +38 -0
  47. data/spec/bundle/{Gemfile → vuln/Gemfile} +0 -0
  48. data/spec/database_spec.rb +1 -32
  49. data/spec/integration_spec.rb +63 -0
  50. data/spec/spec_helper.rb +14 -1
  51. metadata +68 -112
  52. data/data/bundler/audit/mail/2011-0739.yml +0 -17
  53. data/data/bundler/audit/mail/2012-2139.yml +0 -16
  54. data/data/bundler/audit/mail/2012-2140.yml +0 -13
  55. data/data/bundler/audit/rack-cache/2012-267.yml +0 -14
  56. data/data/bundler/audit/rails/2012-1098.yml +0 -19
  57. data/data/bundler/audit/rails/2012-1099.yml +0 -19
  58. data/data/bundler/audit/rails/2012-2660.yml +0 -17
  59. data/data/bundler/audit/rails/2012-2661.yml +0 -18
  60. data/data/bundler/audit/rails/2012-3463.yml +0 -19
  61. data/data/bundler/audit/rails/2012-3464.yml +0 -18
  62. data/data/bundler/audit/rails/2012-3465.yml +0 -19
  63. data/spec/bundle/Gemfile.lock +0 -92
@@ -1,17 +0,0 @@
1
- ---
2
- url: http://www.osvdb.org/show/osvdb/70667
3
- title: |
4
- Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb Email From:
5
- Address Arbitrary Shell Command Injection
6
-
7
- description: >
8
- Mail Gem for Ruby contains a flaw related to the failure to properly
9
- sanitise input passed from an email from address in the 'deliver()'
10
- function in 'lib/mail/network/delivery_methods/sendmail.rb' before
11
- being used as a command line argument. This may allow a remote
12
- attacker to inject arbitrary shell commands.
13
-
14
- cvss_v2: 6.8
15
-
16
- patched_versions:
17
- - ">= 2.2.15"
@@ -1,16 +0,0 @@
1
- ---
2
- url: http://www.osvdb.org/show/osvdb/81631
3
- title: Mail Gem for Ruby File Delivery Method to Parameter Traversal Arbitrary File Manipulation
4
-
5
- description: >
6
- Mail Gem for Ruby contains a flaw that allows a remote
7
- attacker to traverse outside of a restricted path. The issue is due
8
- to the program not properly sanitizing user input, specifically
9
- directory traversal style attacks (e.g., ../../) supplied via the
10
- 'to' parameter within the delivery method. This directory traversal
11
- attack would allow the attacker to modify arbitrary files.
12
-
13
- cvss_v2: 5.0
14
-
15
- patched_versions:
16
- - ">= 2.4.4"
@@ -1,13 +0,0 @@
1
- ---
2
- url: http://www.osvdb.org/show/osvdb/81632
3
- title: Mail Gem for Ruby Multiple Delivery Method Remote Shell Command Executio
4
-
5
- description: >
6
- Mail Gem for Ruby contains a flaw that occurs within
7
- the sendmail and exim delivery methods, which may allow an attacker
8
- to execute arbitrary shell commands..
9
-
10
- cvss_v2: 7.5
11
-
12
- patched_versions:
13
- - ">= 2.4.4"
@@ -1,14 +0,0 @@
1
- ---
2
- url: http://osvdb.org/83077
3
- title: rack-cache Rubygem Sensitive HTTP Header Caching Weakness
4
-
5
- description: |
6
- Rack::Cache (rack-cache) contains a flaw related to the
7
- rubygem caching sensitive HTTP headers. This will result in a
8
- weakness that may make it easier for an attacker to gain access to a
9
- user's session via a specially crafted header.
10
-
11
- cvss_v2: 7.5
12
-
13
- patched_versions:
14
- - ">= 1.2"
@@ -1,19 +0,0 @@
1
- ---
2
- url: http://osvdb.org/79726
3
- title: Ruby on Rails SafeBuffer Object [] Direct Manipulation XSS
4
-
5
- description: >
6
- Ruby on Rails contains a flaw that allows a remote cross-site
7
- scripting (XSS) attack. This flaw exists because athe application
8
- does not validate direct manipulations of SafeBuffer objects via
9
- '[]' and other methods. This may allow a user to create a specially
10
- crafted request that would execute arbitrary script code in a user's
11
- browser within the trust relationship between their browser and the
12
- server.
13
-
14
- cvss_v2: 4.3
15
-
16
- patched_versions:
17
- - ~> 3.0.12
18
- - ~> 3.1.4
19
- - ">= 3.2.2"
@@ -1,19 +0,0 @@
1
- ---
2
- url: http://www.osvdb.org/show/osvdb/79727
3
- title: Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb Manually Generated Select Tag Options XSS
4
-
5
- description: >
6
- Ruby on Rails contains a flaw that allows a remote cross-site
7
- scripting (XSS) attack. This flaw exists because the application does
8
- not validate manually generated 'select tag options' upon submission
9
- to actionpack/lib/action_view/helpers/form_options_helper.rb. This may
10
- allow a user to create a specially crafted request that would execute
11
- arbitrary script code in a user's browser within the trust
12
- relationship between their browser and the server.
13
-
14
- cvss_v2: 4.3
15
-
16
- patched_versions:
17
- - ~> 3.0.12
18
- - ~> 3.1.4
19
- - ">= 3.2.2"
@@ -1,17 +0,0 @@
1
- ---
2
- url: http://www.osvdb.org/show/osvdb/82610
3
- title: Ruby on Rails ActiveRecord Class Rack Query Parameter Parsing SQL Query Arbitrary IS NULL Clause Injection
4
-
5
- description: >
6
- Ruby on Rails contains a flaw related to the way ActiveRecord handles
7
- parameters in conjunction with the way Rack parses query parameters.
8
- This issue may allow an attacker to inject arbitrary 'IS NULL' clauses
9
- in to application SQL queries. This may also allow an attacker to have
10
- the SQL query check for NULL in arbitrary places.
11
-
12
- cvss_v2: 7.5
13
-
14
- patched_versions:
15
- - ~> 3.0.13
16
- - ~> 3.1.5
17
- - ">= 3.2.4"
@@ -1,18 +0,0 @@
1
- ---
2
- url: http://www.osvdb.org/show/osvdb/82403
3
- title: Ruby on Rails where Method ActiveRecord Class SQL Injection
4
-
5
- description: >
6
- Ruby on Rails (RoR) contains a flaw that may allow an attacker to
7
- carry out an SQL injection attack. The issue is due to the
8
- ActiveRecord class not properly sanitizing user-supplied input to
9
- the 'where' method. This may allow an attacker to inject or
10
- manipulate SQL queries in an application built on RoR, allowing for
11
- the manipulation or disclosure of arbitrary data.
12
-
13
- cvss_v2: 5.0
14
-
15
- patched_versions:
16
- - ~> 3.0.13
17
- - ~> 3.1.5
18
- - ">= 3.2.4"
@@ -1,19 +0,0 @@
1
- ---
2
- url: http://osvdb.org/84515
3
- title: Ruby on Rails select_tag Helper Method prompt Value XSS
4
-
5
- description: >
6
- Ruby on Rails contains a flaw that allows a remote cross-site
7
- scripting (XSS) attack. This flaw exists because input passed via the
8
- prompt value is not properly sanitized by the select_tag helper method
9
- before returning it to the user. This may allow a user to create a
10
- specially crafted request that would execute arbitrary script code in
11
- a user's browser within the trust relationship between their browser
12
- and the server.
13
-
14
- cvss_v2: 4.3
15
-
16
- patched_versions:
17
- - ~> 3.0.17
18
- - ~> 3.1.8
19
- - ">= 3.2.8"
@@ -1,18 +0,0 @@
1
- ---
2
- url: http://www.osvdb.org/show/osvdb/84516
3
- title: Ruby on Rails HTML Escaping Code XSS
4
-
5
- description: >
6
- Ruby on Rails contains a flaw that allows a remote
7
- cross-site scripting (XSS) attack. This flaw exists because the HTML
8
- escaping code functionality does not properly escape a single quote
9
- character. This may allow a user to create a specially crafted
10
- request that would execute arbitrary script code in a user's browser
11
- within the trust relationship between their browser and the server.
12
-
13
- cvss_v2: 4.3
14
-
15
- patched_versions:
16
- - ~> 3.0.17
17
- - ~> 3.1.8
18
- - ">= 3.2.8"
@@ -1,19 +0,0 @@
1
- ---
2
- url: http://www.osvdb.org/show/osvdb/84513
3
- title: Ruby on Rails strip_tags Helper Method XSS
4
-
5
- description: >
6
- Ruby on Rails contains a flaw that allows a remote cross-site
7
- scripting (XSS) attack. This flaw exists because the application
8
- does not validate input passed via the 'strip_tags' helper method
9
- before returning it to the user. This may allow a user to create a
10
- specially crafted request that would execute arbitrary script code
11
- in a user's browser within the trust relationship between their
12
- browser and the server.
13
-
14
- cvss_v2: 4.3
15
-
16
- patched_versions:
17
- - ~> 3.0.17
18
- - ~> 3.1.8
19
- - ">= 3.2.8"
@@ -1,92 +0,0 @@
1
- GEM
2
- remote: https://rubygems.org/
3
- specs:
4
- actionmailer (3.2.10)
5
- actionpack (= 3.2.10)
6
- mail (~> 2.4.4)
7
- actionpack (3.2.10)
8
- activemodel (= 3.2.10)
9
- activesupport (= 3.2.10)
10
- builder (~> 3.0.0)
11
- erubis (~> 2.7.0)
12
- journey (~> 1.0.4)
13
- rack (~> 1.4.0)
14
- rack-cache (~> 1.2)
15
- rack-test (~> 0.6.1)
16
- sprockets (~> 2.2.1)
17
- activemodel (3.2.10)
18
- activesupport (= 3.2.10)
19
- builder (~> 3.0.0)
20
- activerecord (3.2.10)
21
- activemodel (= 3.2.10)
22
- activesupport (= 3.2.10)
23
- arel (~> 3.0.2)
24
- tzinfo (~> 0.3.29)
25
- activeresource (3.2.10)
26
- activemodel (= 3.2.10)
27
- activesupport (= 3.2.10)
28
- activesupport (3.2.10)
29
- i18n (~> 0.6)
30
- multi_json (~> 1.0)
31
- arel (3.0.2)
32
- builder (3.0.4)
33
- erubis (2.7.0)
34
- hike (1.2.1)
35
- i18n (0.6.1)
36
- journey (1.0.4)
37
- jquery-rails (2.2.0)
38
- railties (>= 3.0, < 5.0)
39
- thor (>= 0.14, < 2.0)
40
- json (1.7.6)
41
- mail (2.4.4)
42
- i18n (>= 0.4.0)
43
- mime-types (~> 1.16)
44
- treetop (~> 1.4.8)
45
- mime-types (1.20.1)
46
- multi_json (1.5.0)
47
- polyglot (0.3.3)
48
- rack (1.4.4)
49
- rack-cache (1.2)
50
- rack (>= 0.4)
51
- rack-ssl (1.3.3)
52
- rack
53
- rack-test (0.6.2)
54
- rack (>= 1.0)
55
- rails (3.2.10)
56
- actionmailer (= 3.2.10)
57
- actionpack (= 3.2.10)
58
- activerecord (= 3.2.10)
59
- activeresource (= 3.2.10)
60
- activesupport (= 3.2.10)
61
- bundler (~> 1.0)
62
- railties (= 3.2.10)
63
- railties (3.2.10)
64
- actionpack (= 3.2.10)
65
- activesupport (= 3.2.10)
66
- rack-ssl (~> 1.3.2)
67
- rake (>= 0.8.7)
68
- rdoc (~> 3.4)
69
- thor (>= 0.14.6, < 2.0)
70
- rake (10.0.3)
71
- rdoc (3.12.1)
72
- json (~> 1.4)
73
- sprockets (2.2.2)
74
- hike (~> 1.2)
75
- multi_json (~> 1.0)
76
- rack (~> 1.0)
77
- tilt (~> 1.1, != 1.3.0)
78
- sqlite3 (1.3.7)
79
- thor (0.17.0)
80
- tilt (1.3.3)
81
- treetop (1.4.12)
82
- polyglot
83
- polyglot (>= 0.3.1)
84
- tzinfo (0.3.35)
85
-
86
- PLATFORMS
87
- ruby
88
-
89
- DEPENDENCIES
90
- jquery-rails
91
- rails (= 3.2.10)
92
- sqlite3