bundler-audit 0.1.2 → 0.2.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (84) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +1 -1
  3. data/ChangeLog.md +10 -0
  4. data/Gemfile +1 -1
  5. data/README.md +50 -34
  6. data/Rakefile +15 -2
  7. data/data/ruby-advisory-db/CONTRIBUTING.md +6 -0
  8. data/data/ruby-advisory-db/CONTRIBUTORS.md +13 -0
  9. data/data/ruby-advisory-db/Gemfile +3 -0
  10. data/data/ruby-advisory-db/LICENSE.txt +5 -0
  11. data/data/ruby-advisory-db/README.md +29 -7
  12. data/data/ruby-advisory-db/Rakefile +27 -0
  13. data/data/ruby-advisory-db/gems/actionpack/{2012-1099.yml → OSVDB-79727.yml} +3 -0
  14. data/data/ruby-advisory-db/gems/actionpack/{2012-3424.yml → OSVDB-84243.yml} +7 -0
  15. data/data/ruby-advisory-db/gems/actionpack/{2012-3465.yml → OSVDB-84513.yml} +3 -0
  16. data/data/ruby-advisory-db/gems/actionpack/{2012-3463.yml → OSVDB-84515.yml} +6 -0
  17. data/data/ruby-advisory-db/gems/actionpack/{2013-0156.yml → OSVDB-89026.yml} +3 -0
  18. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +20 -0
  19. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +23 -0
  20. data/data/ruby-advisory-db/gems/activerecord/{2012-2661.yml → OSVDB-82403.yml} +6 -0
  21. data/data/ruby-advisory-db/gems/activerecord/{2012-2660.yml → OSVDB-82610.yml} +3 -0
  22. data/data/ruby-advisory-db/gems/activerecord/{2013-0155.yml → OSVDB-89025.yml} +3 -0
  23. data/data/ruby-advisory-db/gems/activerecord/{2013-0276.yml → OSVDB-90072.yml} +3 -0
  24. data/data/ruby-advisory-db/gems/activerecord/{2013-0277.yml → OSVDB-90073.yml} +3 -0
  25. data/data/ruby-advisory-db/gems/activerecord/OSVDB-91453.yml +26 -0
  26. data/data/ruby-advisory-db/gems/activesupport/{2012-1098.yml → OSVDB-79726.yml} +6 -0
  27. data/data/ruby-advisory-db/gems/activesupport/{2012-3464.yml → OSVDB-84516.yml} +3 -0
  28. data/data/ruby-advisory-db/gems/activesupport/{2013-0333.yml → OSVDB-89594.yml} +3 -0
  29. data/data/ruby-advisory-db/gems/activesupport/OSVDB-91451.yml +28 -0
  30. data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +10 -0
  31. data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +17 -0
  32. data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +11 -0
  33. data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +12 -0
  34. data/data/ruby-advisory-db/gems/devise/{2013-0233.yml → OSVDB-89642.yml} +2 -0
  35. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +19 -0
  36. data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +9 -0
  37. data/data/ruby-advisory-db/gems/extlib/OSVDB-90740.yml +18 -0
  38. data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +12 -0
  39. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +10 -0
  40. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +10 -0
  41. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +10 -0
  42. data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +9 -0
  43. data/data/ruby-advisory-db/gems/ftpd/OSVDB-90784.yml +18 -0
  44. data/data/ruby-advisory-db/gems/gtk2/{2007-6183.yml → OSVDB-40774.yml} +2 -0
  45. data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +19 -0
  46. data/data/ruby-advisory-db/gems/json/{2013-0269.yml → OSVDB-90074.yml} +4 -2
  47. data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +10 -0
  48. data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +10 -0
  49. data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +10 -0
  50. data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +21 -0
  51. data/data/ruby-advisory-db/gems/mail/{2011-0739.yml → OSVDB-70667.yml} +2 -0
  52. data/data/ruby-advisory-db/gems/mail/{2012-2139.yml → OSVDB-81631.yml} +3 -0
  53. data/data/ruby-advisory-db/gems/mail/{2012-2140.yml → OSVDB-81632.yml} +7 -2
  54. data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +10 -0
  55. data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +15 -0
  56. data/data/ruby-advisory-db/gems/multi_xml/{2013-0175.yml → OSVDB-89148.yml} +2 -0
  57. data/data/ruby-advisory-db/gems/newrelic_rpm/{2013-0284.yml → OSVDB-90189.yml} +4 -2
  58. data/data/ruby-advisory-db/gems/nori/{2013-0285.yml → OSVDB-90196.yml} +4 -2
  59. data/data/ruby-advisory-db/gems/omniauth-oauth2/{2012-6134.yml → OSVDB-90264.yml} +4 -2
  60. data/data/ruby-advisory-db/gems/pdfkit/OSVDB-90867.yml +11 -0
  61. data/data/ruby-advisory-db/gems/rack-cache/{2012-267.yml → OSVDB-83077.yml} +3 -1
  62. data/data/ruby-advisory-db/gems/rack/{2013-0263.yml → OSVDB-89939.yml} +2 -0
  63. data/data/ruby-advisory-db/gems/rdoc/{2013-0256.yml → OSVDB-90004.yml} +2 -0
  64. data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +13 -0
  65. data/data/ruby-advisory-db/gems/ruby_parser/OSVDB-90561.yml +11 -0
  66. data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +10 -0
  67. data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +10 -0
  68. data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +10 -0
  69. data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +10 -0
  70. data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +10 -0
  71. data/data/ruby-advisory-db/lib/scrape.rb +87 -0
  72. data/data/ruby-advisory-db/spec/advisory_example.rb +97 -12
  73. data/gemspec.yml +3 -1
  74. data/lib/bundler/audit/advisory.rb +46 -16
  75. data/lib/bundler/audit/cli.rb +23 -19
  76. data/lib/bundler/audit/scanner.rb +97 -0
  77. data/lib/bundler/audit/version.rb +1 -1
  78. data/spec/advisory_spec.rb +66 -6
  79. data/spec/bundle/insecure_sources/Gemfile +39 -0
  80. data/spec/bundle/secure/Gemfile +1 -1
  81. data/spec/bundle/{vuln → unpatched_gems}/Gemfile +0 -0
  82. data/spec/integration_spec.rb +75 -6
  83. data/spec/scanner_spec.rb +74 -0
  84. metadata +77 -40
@@ -1,8 +1,11 @@
1
1
  ---
2
2
  gem: activerecord
3
+ framework: rails
3
4
  cve: 2012-2661
5
+ osvdb: 82403
4
6
  url: http://www.osvdb.org/show/osvdb/82403
5
7
  title: Ruby on Rails where Method ActiveRecord Class SQL Injection
8
+ date: 2012-05-31
6
9
 
7
10
  description: |
8
11
  Ruby on Rails (RoR) contains a flaw that may allow an attacker to carry out
@@ -13,6 +16,9 @@ description: |
13
16
 
14
17
  cvss_v2: 5.0
15
18
 
19
+ unaffected_versions:
20
+ - ~> 2.3.14
21
+
16
22
  patched_versions:
17
23
  - ~> 3.0.13
18
24
  - ~> 3.1.5
@@ -1,10 +1,13 @@
1
1
  ---
2
2
  gem: activerecord
3
+ framework: rails
3
4
  cve: 2012-2660
5
+ osvdb: 82610
4
6
  url: http://www.osvdb.org/show/osvdb/82610
5
7
  title:
6
8
  Ruby on Rails ActiveRecord Class Rack Query Parameter Parsing SQL Query
7
9
  Arbitrary IS NULL Clause Injection
10
+ date: 2012-05-31
8
11
 
9
12
  description: |
10
13
  Ruby on Rails contains a flaw related to the way ActiveRecord handles
@@ -1,8 +1,11 @@
1
1
  ---
2
2
  gem: activerecord
3
+ framework: rails
3
4
  cve: 2013-0155
5
+ osvdb: 89025
4
6
  url: http://osvdb.org/show/osvdb/89025
5
7
  title: Ruby on Rails Active Record JSON Parameter Parsing Query Bypass
8
+ date: 2013-01-08
6
9
 
7
10
  description: |
8
11
  Ruby on Rails contains a flaw in the Active Record. The issue is due to an
@@ -1,8 +1,11 @@
1
1
  ---
2
2
  gem: activerecord
3
+ framework: rails
3
4
  cve: 2013-0276
5
+ osvdb: 90072
4
6
  url: http://direct.osvdb.org/show/osvdb/90072
5
7
  title: Ruby on Rails Active Record attr_protected Method Bypass
8
+ date: 2013-02-11
6
9
 
7
10
  description: |
8
11
  Ruby on Rails contains a flaw in the attr_protected method of the
@@ -1,10 +1,13 @@
1
1
  ---
2
2
  gem: activerecord
3
+ framework: rails
3
4
  cve: 2013-0277
5
+ osvdb: 90073
4
6
  url: http://direct.osvdb.org/show/osvdb/90073
5
7
  title:
6
8
  Ruby on Rails Active Record +serialize+ Helper YAML Attribute Handling Remote
7
9
  Code Execution
10
+ date: 2013-02-11
8
11
 
9
12
  description: |
10
13
  Ruby on Rails contains a flaw in the +serialize+ helper in the Active Record.
@@ -0,0 +1,26 @@
1
+ ---
2
+ gem: activerecord
3
+ framework: rails
4
+ cve: 2013-1854
5
+ osvdb: 91453
6
+ url: http://osvdb.org/show/osvdb/91453
7
+ title: Symbol DoS vulnerability in Active Record
8
+ date: 2013-03-19
9
+
10
+ description: |
11
+ When a hash is provided as the find value for a query, the keys of
12
+ the hash may be converted to symbols. Carefully crafted requests can
13
+ coerce `params[:name]` to return a hash, and the keys to that hash
14
+ may be converted to symbols. Ruby symbols are not garbage collected,
15
+ so an attacker can initiate a denial of service attack by creating a
16
+ large number of symbols.
17
+
18
+ cvss_v2: 7.8
19
+
20
+ unaffected_versions:
21
+ - ~> 3.0.0
22
+
23
+ patched_versions:
24
+ - ~> 2.3.18
25
+ - ~> 3.1.12
26
+ - ">= 3.2.13"
@@ -1,8 +1,11 @@
1
1
  ---
2
2
  gem: activesupport
3
+ framework: rails
3
4
  cve: 2012-1098
5
+ osvdb: 79726
4
6
  url: http://osvdb.org/79726
5
7
  title: Ruby on Rails SafeBuffer Object [] Direct Manipulation XSS
8
+ date: 2012-03-01
6
9
 
7
10
  description: |
8
11
  Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
@@ -14,6 +17,9 @@ description: |
14
17
 
15
18
  cvss_v2: 4.3
16
19
 
20
+ unaffected_versions:
21
+ - "< 3.0.0"
22
+
17
23
  patched_versions:
18
24
  - ~> 3.0.12
19
25
  - ~> 3.1.4
@@ -1,8 +1,11 @@
1
1
  ---
2
2
  gem: activesupport
3
+ framework: rails
3
4
  cve: 2012-3464
5
+ osvdb: 84516
4
6
  url: http://www.osvdb.org/show/osvdb/84516
5
7
  title: Ruby on Rails HTML Escaping Code XSS
8
+ date: 2012-08-09
6
9
 
7
10
  description: |
8
11
  Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
@@ -1,10 +1,13 @@
1
1
  ---
2
2
  gem: activesupport
3
+ framework: rails
3
4
  cve: 2013-0333
5
+ osvdb: 89594
4
6
  url: http://osvdb.org/show/osvdb/89594
5
7
  title:
6
8
  Ruby on Rails JSON Parser Crafted Payload YAML Subset Decoding Remote Code
7
9
  Execution
10
+ date: 2013-01-28
8
11
 
9
12
  description: |
10
13
  Ruby on Rails contains a flaw in the JSON parser. Rails supports multiple
@@ -0,0 +1,28 @@
1
+ ---
2
+ gem: activesupport
3
+ framework: rails
4
+ platform: jruby
5
+ cve: 2013-1856
6
+ osvdb: 91451
7
+ url: http://www.osvdb.org/show/osvdb/91451
8
+ title: XML Parsing Vulnerability affecting JRuby users
9
+ date: 2013-03-19
10
+
11
+ description: |
12
+ The ActiveSupport XML parsing functionality supports multiple
13
+ pluggable backends. One backend supported for JRuby users is
14
+ ActiveSupport::XmlMini_JDOM which makes use of the
15
+ javax.xml.parsers.DocumentBuilder class. In some JVM configurations
16
+ the default settings of that class can allow an attacker to construct
17
+ XML which, when parsed, will contain the contents of arbitrary URLs
18
+ including files from the application server. They may also allow for
19
+ various denial of service attacks. Action Pack
20
+
21
+ cvss_v2: 7.8
22
+
23
+ unaffected_versions:
24
+ - ~> 2.3.0
25
+
26
+ patched_versions:
27
+ - ~> 3.1.12
28
+ - ">= 3.2.13"
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: command_wrap
3
+ cve: 2013-1875
4
+ osvdb: 91450
5
+ url: http://osvdb.org/show/osvdb/91450
6
+ title: command_wrap Gem for Ruby URI Handling Arbitrary Command Injection
7
+ date: 2013-03-18
8
+ description: command_wrap Gem for Ruby contains a flaw that is triggered during the handling of input passed via the URL that contains a semicolon character (;). This will allow a remote attacker to inject arbitrary commands and have them executed in the context of the user clicking it.
9
+ cvss_v2: 7.5
10
+ patched_versions:
@@ -0,0 +1,17 @@
1
+ ---
2
+ gem: crack
3
+ cve: 2013-1800
4
+ osvdb: 90742
5
+ url: http://osvdb.org/show/osvdb/90742
6
+ title: crack Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
7
+ description: |
8
+ crack Gem for Ruby contains a flaw that is triggered when a type casting
9
+ error occurs during the parsing of parameters. This may allow a
10
+ context-dependent attacker to potentially execute arbitrary code.
11
+ date: 2013-01-09
12
+
13
+ cvss_v2: 9.3
14
+
15
+ patched_versions:
16
+ - ">= 0.3.2"
17
+
@@ -0,0 +1,11 @@
1
+ ---
2
+ gem: cremefraiche
3
+ cve: 2013-2090
4
+ osvdb: 93395
5
+ url: http://osvdb.org/show/osvdb/93395
6
+ title: Creme Fraiche Gem for Ruby File Name Shell Metacharacter Injection Arbitrary Command Execution
7
+ date: 2013-05-14
8
+ description: Creme Fraiche Gem for Ruby contains a flaw that is due to the program failing to properly sanitize input in file names. With a specially crafted file name that contains shell metacharacters, a context-dependent attacker can execute arbitrary commands
9
+ cvss_v2:
10
+ patched_versions:
11
+ - ">= 0.6.1"
@@ -0,0 +1,12 @@
1
+ ---
2
+ gem: curl
3
+ cve: 2013-1878
4
+ osvdb: 91230
5
+ url: http://osvdb.org/show/osvdb/91230
6
+ title: Curl Gem for Ruby URI Handling Arbitrary Command Injection
7
+ date: 2013-03-12
8
+
9
+ description: Curl Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via the URL. This may allow a context-dependent attacker to potentially execute arbitrary commands by injecting them via a semi-colon (;).
10
+
11
+ cvss_v2: 9.3
12
+
@@ -1,8 +1,10 @@
1
1
  ---
2
2
  gem: devise
3
3
  cve: 2013-0233
4
+ osvdb: 89642
4
5
  url: http://osvdb.org/show/osvdb/89642
5
6
  title: Devise Database Type Conversion Crafted Request Parsing Security Bypass
7
+ date: 2013-01-28
6
8
 
7
9
  description: |
8
10
  Devise contains a flaw that is triggered during when a type conversion error
@@ -0,0 +1,19 @@
1
+ ---
2
+ gem: dragonfly
3
+ cve: 2013-1756
4
+ osvdb: 90647
5
+ url: http://www.osvdb.com/show/osvdb/90647
6
+ title: Dragonfly Gem Remote Code Execution
7
+ date: 2013-02-19
8
+
9
+ description: |
10
+ The Dragonfly gem contains a flaw that allows an attacker to run arbitrary code
11
+ on a host machine using carefully crafted requests.
12
+
13
+ cvss_v2:
14
+
15
+ patched_versions:
16
+ - ">= 0.9.13"
17
+
18
+ unaffected_versions:
19
+ - "< 0.7.0"
@@ -0,0 +1,9 @@
1
+ ---
2
+ gem: enum_column3
3
+ osvdb: 94679
4
+ url: http://osvdb.org/show/osvdb/94679
5
+ title: enum_column3 Gem for Ruby Symbol Creation Remote DoS
6
+ date: 2013-06-26
7
+ description: The enum_column3 Gem for Ruby contains a flaw that may allow a remote denial of service. The issue is due to the program typecasting unexpected strings to symbols. This may allow a remote attacker to crash the program.
8
+ cvss_v2:
9
+ patched_versions:
@@ -0,0 +1,18 @@
1
+ ---
2
+ gem: extlib
3
+ cve: 2013-1802
4
+ osvdb: 90740
5
+ url: http://osvdb.org/show/osvdb/90740
6
+ title: extlib Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
7
+ date: 2013-01-08
8
+
9
+ description: |
10
+ extlib Gem for Ruby contains a flaw that is triggered when a type casting
11
+ error occurs during the parsing of parameters. This may allow a
12
+ context-dependent attacker to potentially execute arbitrary code.
13
+
14
+ cvss_v2: 9.3
15
+
16
+ patched_versions:
17
+ - ">= 0.9.16"
18
+
@@ -0,0 +1,12 @@
1
+ ---
2
+ gem: fastreader
3
+ cve: 2013-1876
4
+ osvdb: 91232
5
+ url: http://osvdb.org/show/osvdb/91232
6
+ title: fastreader Gem for Ruby URI Handling Arbitrary Command Injection
7
+ date: 2013-03-13
8
+
9
+ description: fastreader Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.
10
+
11
+ cvss_v2: 9.3
12
+
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: fileutils
3
+ cve:
4
+ osvdb: 90715
5
+ url: http://osvdb.org/show/osvdb/90715
6
+ title: fileutils Gem for Ruby files_utils.rb /tmp File Symlink Arbitrary File Overwrite
7
+ date: 2013-02-28
8
+ description: fileutils Gem for Ruby contains a flaw as the program creates temporary files insecurely. It is possible for a local attacker to use a symlink attack against temporary files created by files_utils.rb to cause the program to unexpectedly overwrite an arbitrary file.
9
+ cvss_v2:
10
+ patched_versions:
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: fileutils
3
+ cve:
4
+ osvdb: 90716
5
+ url: http://osvdb.org/show/osvdb/90716
6
+ title: fileutils Gem for Ruby Temporary Directory Hijacking Weakness
7
+ date: 2013-02-28
8
+ description: fileutils Gem for Ruby contains a flaw that is due to the program not verifying the existence of a directory before attempting to create it. This may allow a local attacker to create the directory in advance, thus owning any files subsequently written to it.
9
+ cvss_v2:
10
+ patched_versions:
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: fileutils
3
+ cve: 2013-2516
4
+ osvdb: 90717
5
+ url: http://osvdb.org/show/osvdb/90717
6
+ title: fileutils Gem for Ruby file_utils.rb Crafted URL Handling Remote Command Execution
7
+ date: 2013-02-28
8
+ description: fileutils Gem for Ruby contains a flaw in file_utils.rb. The issue is triggered when handling a specially crafted URL containing a command after a delimiter (;). This may allow a remote attacker to potentially execute arbitrary commands.
9
+ cvss_v2:
10
+ patched_versions:
@@ -0,0 +1,9 @@
1
+ ---
2
+ gem: flash_tool
3
+ cve: 2013-2513
4
+ osvdb: 90829
5
+ url: http://osvdb.org/show/osvdb/90829
6
+ title: flash_tool Gem for Ruby File Download Handling Arbitrary Command Execution
7
+ date: 2013-03-04
8
+ description: flash_tool Gem for Ruby contains a flaw that is triggered during the handling of downloaded files that contain shell characters. With a specially crafted file, a context-dependent attacker can execute arbitrary commands.
9
+ cvss_v2:
@@ -0,0 +1,18 @@
1
+ ---
2
+ gem: ftpd
3
+ cve: 2013-2512
4
+ osvdb: 90784
5
+ url: http://osvdb.org/show/osvdb/90784
6
+ title: ftpd Gem for Ruby Shell Character Handling Remote Command Injection
7
+ date: 2013-02-28
8
+
9
+ description: |
10
+ ftpd Gem for Ruby contains a flaw that is triggered when handling a
11
+ specially crafted option or filename that contains a shell
12
+ character. This may allow a remote attacker to inject arbitrary
13
+ commands.
14
+
15
+ cvss_v2: 9.0
16
+
17
+ patched_versions:
18
+ - ">= 0.2.2"
@@ -1,10 +1,12 @@
1
1
  ---
2
2
  gem: gtk2
3
3
  cve: 2007-6183
4
+ osvdb: 40774
4
5
  url: http://osvdb.org/show/osvdb/40774
5
6
  title:
6
7
  Ruby-GNOME2 gtk/src/rbgtkmessagedialog.c Gtk::MessageDialog.new() Function
7
8
  Format String
9
+ date: 2007-11-27
8
10
 
9
11
  description: |
10
12
  Format string vulnerability in the mdiag_initialize function in
@@ -0,0 +1,19 @@
1
+ ---
2
+ gem: httparty
3
+ cve: 2013-1802
4
+ osvdb: 90741
5
+ url: http://osvdb.org/show/osvdb/90741
6
+ title:
7
+ httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
8
+ date: 2013-01-14
9
+
10
+ description: |
11
+ httparty Gem for Ruby contains a flaw that is triggered when a type casting
12
+ error occurs during the parsing of parameters. This may allow a
13
+ context-dependent attacker to potentially execute arbitrary code.
14
+
15
+ cvss_v2: 9.3
16
+
17
+ patched_versions:
18
+ - ">= 0.10.0"
19
+
@@ -1,8 +1,10 @@
1
1
  ---
2
2
  gem: json
3
3
  cve: 2013-0269
4
+ osvdb: 90074
4
5
  url: http://direct.osvdb.org/show/osvdb/90074
5
6
  title: Ruby on Rails JSON Gem Arbitrary Symbol Creation Remote DoS
7
+ date: 2013-02-11
6
8
 
7
9
  description: |
8
10
  Ruby on Rails contains a flaw that may allow a remote denial of service.
@@ -16,6 +18,6 @@ description: |
16
18
  cvss_v2: 9.0
17
19
 
18
20
  patched_versions:
19
- - ~> 1.5.4
20
- - ~> 1.6.7
21
+ - ~> 1.5.5
22
+ - ~> 1.6.8
21
23
  - ">= 1.7.7"
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: karteek-docsplit
3
+ cve: 2013-1933
4
+ osvdb: 92117
5
+ url: http://osvdb.org/show/osvdb/92117
6
+ title: Karteek Docsplit Gem for Ruby text_extractor.rb File Name Shell Metacharacter Injection Arbitrary Command Execution
7
+ date: 2013-04-08
8
+ description: Karteek Docsplit Gem for Ruby contains a flaw that is due to the program failing to properly sanitize input passed to text_extractor.rb. With a specially crafted file name that contains shell metacharacters, a context-dependent attacker can execute arbitrary commands
9
+ cvss_v2: 9.3
10
+ patched_versions: