bundler-audit 0.1.1 → 0.1.2
Sign up to get free protection for your applications and to get access to all the features.
- data/.gitignore +3 -0
- data/.gitmodules +3 -0
- data/.travis.yml +4 -0
- data/ChangeLog.md +13 -0
- data/Gemfile +12 -0
- data/README.md +3 -37
- data/Rakefile +20 -49
- data/bundler-audit.gemspec +7 -0
- data/data/ruby-advisory-db/.rspec +1 -0
- data/data/ruby-advisory-db/README.md +64 -0
- data/data/ruby-advisory-db/gems/actionpack/2012-1099.yml +23 -0
- data/data/{bundler/audit/rails → ruby-advisory-db/gems/actionpack}/2012-3424.yml +10 -6
- data/data/ruby-advisory-db/gems/actionpack/2012-3463.yml +20 -0
- data/data/ruby-advisory-db/gems/actionpack/2012-3465.yml +20 -0
- data/data/{bundler/audit/rails → ruby-advisory-db/gems/actionpack}/2013-0156.yml +5 -3
- data/data/ruby-advisory-db/gems/activerecord/2012-2660.yml +21 -0
- data/data/ruby-advisory-db/gems/activerecord/2012-2661.yml +19 -0
- data/data/{bundler/audit/rails → ruby-advisory-db/gems/activerecord}/2013-0155.yml +6 -4
- data/data/{bundler/audit/rails → ruby-advisory-db/gems/activerecord}/2013-0276.yml +5 -3
- data/data/{bundler/audit/rails → ruby-advisory-db/gems/activerecord}/2013-0277.yml +5 -3
- data/data/ruby-advisory-db/gems/activesupport/2012-1098.yml +20 -0
- data/data/ruby-advisory-db/gems/activesupport/2012-3464.yml +20 -0
- data/data/{bundler/audit/rails → ruby-advisory-db/gems/activesupport}/2013-0333.yml +5 -3
- data/data/ruby-advisory-db/gems/devise/2013-0233.yml +18 -0
- data/data/ruby-advisory-db/gems/gtk2/2007-6183.yml +18 -0
- data/data/{bundler/audit → ruby-advisory-db/gems}/json/2013-0269.yml +4 -2
- data/data/ruby-advisory-db/gems/mail/2011-0739.yml +19 -0
- data/data/ruby-advisory-db/gems/mail/2012-2139.yml +11 -0
- data/data/ruby-advisory-db/gems/mail/2012-2140.yml +11 -0
- data/data/ruby-advisory-db/gems/multi_xml/2013-0175.yml +14 -0
- data/data/ruby-advisory-db/gems/newrelic_rpm/2013-0284.yml +15 -0
- data/data/ruby-advisory-db/gems/nori/2013-0285.yml +17 -0
- data/data/ruby-advisory-db/gems/omniauth-oauth2/2012-6134.yml +14 -0
- data/data/ruby-advisory-db/gems/rack-cache/2012-267.yml +16 -0
- data/data/{bundler/audit → ruby-advisory-db/gems}/rack/2013-0263.yml +9 -8
- data/data/ruby-advisory-db/gems/rdoc/2013-0256.yml +25 -0
- data/data/ruby-advisory-db/spec/advisory_example.rb +80 -0
- data/data/ruby-advisory-db/spec/gems_spec.rb +8 -0
- data/data/ruby-advisory-db/spec/spec_helper.rb +1 -0
- data/gemspec.yml +1 -6
- data/lib/bundler/audit/advisory.rb +13 -1
- data/lib/bundler/audit/cli.rb +17 -6
- data/lib/bundler/audit/database.rb +1 -30
- data/lib/bundler/audit/version.rb +1 -1
- data/spec/advisory_spec.rb +1 -1
- data/spec/bundle/secure/Gemfile +38 -0
- data/spec/bundle/{Gemfile → vuln/Gemfile} +0 -0
- data/spec/database_spec.rb +1 -32
- data/spec/integration_spec.rb +63 -0
- data/spec/spec_helper.rb +14 -1
- metadata +68 -112
- data/data/bundler/audit/mail/2011-0739.yml +0 -17
- data/data/bundler/audit/mail/2012-2139.yml +0 -16
- data/data/bundler/audit/mail/2012-2140.yml +0 -13
- data/data/bundler/audit/rack-cache/2012-267.yml +0 -14
- data/data/bundler/audit/rails/2012-1098.yml +0 -19
- data/data/bundler/audit/rails/2012-1099.yml +0 -19
- data/data/bundler/audit/rails/2012-2660.yml +0 -17
- data/data/bundler/audit/rails/2012-2661.yml +0 -18
- data/data/bundler/audit/rails/2012-3463.yml +0 -19
- data/data/bundler/audit/rails/2012-3464.yml +0 -18
- data/data/bundler/audit/rails/2012-3465.yml +0 -19
- data/spec/bundle/Gemfile.lock +0 -92
@@ -1,17 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://www.osvdb.org/show/osvdb/70667
|
3
|
-
title: |
|
4
|
-
Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb Email From:
|
5
|
-
Address Arbitrary Shell Command Injection
|
6
|
-
|
7
|
-
description: >
|
8
|
-
Mail Gem for Ruby contains a flaw related to the failure to properly
|
9
|
-
sanitise input passed from an email from address in the 'deliver()'
|
10
|
-
function in 'lib/mail/network/delivery_methods/sendmail.rb' before
|
11
|
-
being used as a command line argument. This may allow a remote
|
12
|
-
attacker to inject arbitrary shell commands.
|
13
|
-
|
14
|
-
cvss_v2: 6.8
|
15
|
-
|
16
|
-
patched_versions:
|
17
|
-
- ">= 2.2.15"
|
@@ -1,16 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://www.osvdb.org/show/osvdb/81631
|
3
|
-
title: Mail Gem for Ruby File Delivery Method to Parameter Traversal Arbitrary File Manipulation
|
4
|
-
|
5
|
-
description: >
|
6
|
-
Mail Gem for Ruby contains a flaw that allows a remote
|
7
|
-
attacker to traverse outside of a restricted path. The issue is due
|
8
|
-
to the program not properly sanitizing user input, specifically
|
9
|
-
directory traversal style attacks (e.g., ../../) supplied via the
|
10
|
-
'to' parameter within the delivery method. This directory traversal
|
11
|
-
attack would allow the attacker to modify arbitrary files.
|
12
|
-
|
13
|
-
cvss_v2: 5.0
|
14
|
-
|
15
|
-
patched_versions:
|
16
|
-
- ">= 2.4.4"
|
@@ -1,13 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://www.osvdb.org/show/osvdb/81632
|
3
|
-
title: Mail Gem for Ruby Multiple Delivery Method Remote Shell Command Executio
|
4
|
-
|
5
|
-
description: >
|
6
|
-
Mail Gem for Ruby contains a flaw that occurs within
|
7
|
-
the sendmail and exim delivery methods, which may allow an attacker
|
8
|
-
to execute arbitrary shell commands..
|
9
|
-
|
10
|
-
cvss_v2: 7.5
|
11
|
-
|
12
|
-
patched_versions:
|
13
|
-
- ">= 2.4.4"
|
@@ -1,14 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://osvdb.org/83077
|
3
|
-
title: rack-cache Rubygem Sensitive HTTP Header Caching Weakness
|
4
|
-
|
5
|
-
description: |
|
6
|
-
Rack::Cache (rack-cache) contains a flaw related to the
|
7
|
-
rubygem caching sensitive HTTP headers. This will result in a
|
8
|
-
weakness that may make it easier for an attacker to gain access to a
|
9
|
-
user's session via a specially crafted header.
|
10
|
-
|
11
|
-
cvss_v2: 7.5
|
12
|
-
|
13
|
-
patched_versions:
|
14
|
-
- ">= 1.2"
|
@@ -1,19 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://osvdb.org/79726
|
3
|
-
title: Ruby on Rails SafeBuffer Object [] Direct Manipulation XSS
|
4
|
-
|
5
|
-
description: >
|
6
|
-
Ruby on Rails contains a flaw that allows a remote cross-site
|
7
|
-
scripting (XSS) attack. This flaw exists because athe application
|
8
|
-
does not validate direct manipulations of SafeBuffer objects via
|
9
|
-
'[]' and other methods. This may allow a user to create a specially
|
10
|
-
crafted request that would execute arbitrary script code in a user's
|
11
|
-
browser within the trust relationship between their browser and the
|
12
|
-
server.
|
13
|
-
|
14
|
-
cvss_v2: 4.3
|
15
|
-
|
16
|
-
patched_versions:
|
17
|
-
- ~> 3.0.12
|
18
|
-
- ~> 3.1.4
|
19
|
-
- ">= 3.2.2"
|
@@ -1,19 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://www.osvdb.org/show/osvdb/79727
|
3
|
-
title: Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb Manually Generated Select Tag Options XSS
|
4
|
-
|
5
|
-
description: >
|
6
|
-
Ruby on Rails contains a flaw that allows a remote cross-site
|
7
|
-
scripting (XSS) attack. This flaw exists because the application does
|
8
|
-
not validate manually generated 'select tag options' upon submission
|
9
|
-
to actionpack/lib/action_view/helpers/form_options_helper.rb. This may
|
10
|
-
allow a user to create a specially crafted request that would execute
|
11
|
-
arbitrary script code in a user's browser within the trust
|
12
|
-
relationship between their browser and the server.
|
13
|
-
|
14
|
-
cvss_v2: 4.3
|
15
|
-
|
16
|
-
patched_versions:
|
17
|
-
- ~> 3.0.12
|
18
|
-
- ~> 3.1.4
|
19
|
-
- ">= 3.2.2"
|
@@ -1,17 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://www.osvdb.org/show/osvdb/82610
|
3
|
-
title: Ruby on Rails ActiveRecord Class Rack Query Parameter Parsing SQL Query Arbitrary IS NULL Clause Injection
|
4
|
-
|
5
|
-
description: >
|
6
|
-
Ruby on Rails contains a flaw related to the way ActiveRecord handles
|
7
|
-
parameters in conjunction with the way Rack parses query parameters.
|
8
|
-
This issue may allow an attacker to inject arbitrary 'IS NULL' clauses
|
9
|
-
in to application SQL queries. This may also allow an attacker to have
|
10
|
-
the SQL query check for NULL in arbitrary places.
|
11
|
-
|
12
|
-
cvss_v2: 7.5
|
13
|
-
|
14
|
-
patched_versions:
|
15
|
-
- ~> 3.0.13
|
16
|
-
- ~> 3.1.5
|
17
|
-
- ">= 3.2.4"
|
@@ -1,18 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://www.osvdb.org/show/osvdb/82403
|
3
|
-
title: Ruby on Rails where Method ActiveRecord Class SQL Injection
|
4
|
-
|
5
|
-
description: >
|
6
|
-
Ruby on Rails (RoR) contains a flaw that may allow an attacker to
|
7
|
-
carry out an SQL injection attack. The issue is due to the
|
8
|
-
ActiveRecord class not properly sanitizing user-supplied input to
|
9
|
-
the 'where' method. This may allow an attacker to inject or
|
10
|
-
manipulate SQL queries in an application built on RoR, allowing for
|
11
|
-
the manipulation or disclosure of arbitrary data.
|
12
|
-
|
13
|
-
cvss_v2: 5.0
|
14
|
-
|
15
|
-
patched_versions:
|
16
|
-
- ~> 3.0.13
|
17
|
-
- ~> 3.1.5
|
18
|
-
- ">= 3.2.4"
|
@@ -1,19 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://osvdb.org/84515
|
3
|
-
title: Ruby on Rails select_tag Helper Method prompt Value XSS
|
4
|
-
|
5
|
-
description: >
|
6
|
-
Ruby on Rails contains a flaw that allows a remote cross-site
|
7
|
-
scripting (XSS) attack. This flaw exists because input passed via the
|
8
|
-
prompt value is not properly sanitized by the select_tag helper method
|
9
|
-
before returning it to the user. This may allow a user to create a
|
10
|
-
specially crafted request that would execute arbitrary script code in
|
11
|
-
a user's browser within the trust relationship between their browser
|
12
|
-
and the server.
|
13
|
-
|
14
|
-
cvss_v2: 4.3
|
15
|
-
|
16
|
-
patched_versions:
|
17
|
-
- ~> 3.0.17
|
18
|
-
- ~> 3.1.8
|
19
|
-
- ">= 3.2.8"
|
@@ -1,18 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://www.osvdb.org/show/osvdb/84516
|
3
|
-
title: Ruby on Rails HTML Escaping Code XSS
|
4
|
-
|
5
|
-
description: >
|
6
|
-
Ruby on Rails contains a flaw that allows a remote
|
7
|
-
cross-site scripting (XSS) attack. This flaw exists because the HTML
|
8
|
-
escaping code functionality does not properly escape a single quote
|
9
|
-
character. This may allow a user to create a specially crafted
|
10
|
-
request that would execute arbitrary script code in a user's browser
|
11
|
-
within the trust relationship between their browser and the server.
|
12
|
-
|
13
|
-
cvss_v2: 4.3
|
14
|
-
|
15
|
-
patched_versions:
|
16
|
-
- ~> 3.0.17
|
17
|
-
- ~> 3.1.8
|
18
|
-
- ">= 3.2.8"
|
@@ -1,19 +0,0 @@
|
|
1
|
-
---
|
2
|
-
url: http://www.osvdb.org/show/osvdb/84513
|
3
|
-
title: Ruby on Rails strip_tags Helper Method XSS
|
4
|
-
|
5
|
-
description: >
|
6
|
-
Ruby on Rails contains a flaw that allows a remote cross-site
|
7
|
-
scripting (XSS) attack. This flaw exists because the application
|
8
|
-
does not validate input passed via the 'strip_tags' helper method
|
9
|
-
before returning it to the user. This may allow a user to create a
|
10
|
-
specially crafted request that would execute arbitrary script code
|
11
|
-
in a user's browser within the trust relationship between their
|
12
|
-
browser and the server.
|
13
|
-
|
14
|
-
cvss_v2: 4.3
|
15
|
-
|
16
|
-
patched_versions:
|
17
|
-
- ~> 3.0.17
|
18
|
-
- ~> 3.1.8
|
19
|
-
- ">= 3.2.8"
|
data/spec/bundle/Gemfile.lock
DELETED
@@ -1,92 +0,0 @@
|
|
1
|
-
GEM
|
2
|
-
remote: https://rubygems.org/
|
3
|
-
specs:
|
4
|
-
actionmailer (3.2.10)
|
5
|
-
actionpack (= 3.2.10)
|
6
|
-
mail (~> 2.4.4)
|
7
|
-
actionpack (3.2.10)
|
8
|
-
activemodel (= 3.2.10)
|
9
|
-
activesupport (= 3.2.10)
|
10
|
-
builder (~> 3.0.0)
|
11
|
-
erubis (~> 2.7.0)
|
12
|
-
journey (~> 1.0.4)
|
13
|
-
rack (~> 1.4.0)
|
14
|
-
rack-cache (~> 1.2)
|
15
|
-
rack-test (~> 0.6.1)
|
16
|
-
sprockets (~> 2.2.1)
|
17
|
-
activemodel (3.2.10)
|
18
|
-
activesupport (= 3.2.10)
|
19
|
-
builder (~> 3.0.0)
|
20
|
-
activerecord (3.2.10)
|
21
|
-
activemodel (= 3.2.10)
|
22
|
-
activesupport (= 3.2.10)
|
23
|
-
arel (~> 3.0.2)
|
24
|
-
tzinfo (~> 0.3.29)
|
25
|
-
activeresource (3.2.10)
|
26
|
-
activemodel (= 3.2.10)
|
27
|
-
activesupport (= 3.2.10)
|
28
|
-
activesupport (3.2.10)
|
29
|
-
i18n (~> 0.6)
|
30
|
-
multi_json (~> 1.0)
|
31
|
-
arel (3.0.2)
|
32
|
-
builder (3.0.4)
|
33
|
-
erubis (2.7.0)
|
34
|
-
hike (1.2.1)
|
35
|
-
i18n (0.6.1)
|
36
|
-
journey (1.0.4)
|
37
|
-
jquery-rails (2.2.0)
|
38
|
-
railties (>= 3.0, < 5.0)
|
39
|
-
thor (>= 0.14, < 2.0)
|
40
|
-
json (1.7.6)
|
41
|
-
mail (2.4.4)
|
42
|
-
i18n (>= 0.4.0)
|
43
|
-
mime-types (~> 1.16)
|
44
|
-
treetop (~> 1.4.8)
|
45
|
-
mime-types (1.20.1)
|
46
|
-
multi_json (1.5.0)
|
47
|
-
polyglot (0.3.3)
|
48
|
-
rack (1.4.4)
|
49
|
-
rack-cache (1.2)
|
50
|
-
rack (>= 0.4)
|
51
|
-
rack-ssl (1.3.3)
|
52
|
-
rack
|
53
|
-
rack-test (0.6.2)
|
54
|
-
rack (>= 1.0)
|
55
|
-
rails (3.2.10)
|
56
|
-
actionmailer (= 3.2.10)
|
57
|
-
actionpack (= 3.2.10)
|
58
|
-
activerecord (= 3.2.10)
|
59
|
-
activeresource (= 3.2.10)
|
60
|
-
activesupport (= 3.2.10)
|
61
|
-
bundler (~> 1.0)
|
62
|
-
railties (= 3.2.10)
|
63
|
-
railties (3.2.10)
|
64
|
-
actionpack (= 3.2.10)
|
65
|
-
activesupport (= 3.2.10)
|
66
|
-
rack-ssl (~> 1.3.2)
|
67
|
-
rake (>= 0.8.7)
|
68
|
-
rdoc (~> 3.4)
|
69
|
-
thor (>= 0.14.6, < 2.0)
|
70
|
-
rake (10.0.3)
|
71
|
-
rdoc (3.12.1)
|
72
|
-
json (~> 1.4)
|
73
|
-
sprockets (2.2.2)
|
74
|
-
hike (~> 1.2)
|
75
|
-
multi_json (~> 1.0)
|
76
|
-
rack (~> 1.0)
|
77
|
-
tilt (~> 1.1, != 1.3.0)
|
78
|
-
sqlite3 (1.3.7)
|
79
|
-
thor (0.17.0)
|
80
|
-
tilt (1.3.3)
|
81
|
-
treetop (1.4.12)
|
82
|
-
polyglot
|
83
|
-
polyglot (>= 0.3.1)
|
84
|
-
tzinfo (0.3.35)
|
85
|
-
|
86
|
-
PLATFORMS
|
87
|
-
ruby
|
88
|
-
|
89
|
-
DEPENDENCIES
|
90
|
-
jquery-rails
|
91
|
-
rails (= 3.2.10)
|
92
|
-
sqlite3
|