bundler-audit 0.4.0 → 0.5.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/ChangeLog.md +16 -0
- data/README.md +23 -10
- data/data/ruby-advisory-db.ts +1 -1
- data/data/ruby-advisory-db/.gitignore +1 -0
- data/data/ruby-advisory-db/.travis.yml +18 -0
- data/data/ruby-advisory-db/CONTRIBUTING.md +53 -3
- data/data/ruby-advisory-db/CONTRIBUTORS.md +17 -2
- data/data/ruby-advisory-db/Gemfile +8 -2
- data/data/ruby-advisory-db/Rakefile +1 -2
- data/data/ruby-advisory-db/gems/{arabic-prawn → Arabic-Prawn}/OSVDB-104365.yml +3 -6
- data/data/ruby-advisory-db/gems/RedCloth/OSVDB-115941.yml +16 -0
- data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4995.yml +13 -0
- data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4996.yml +13 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-0130.yml +23 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7818.yml +24 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7829.yml +26 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7576.yml +116 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7581.yml +55 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-0751.yml +71 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +1 -1
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +2 -2
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +6 -6
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +2 -2
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +2 -2
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-103439.yml +1 -1
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-103440.yml +1 -1
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-74616.yml +18 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-77199.yml +23 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-84243.yml +4 -4
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +4 -4
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +4 -4
- data/data/ruby-advisory-db/gems/actionview/CVE-2016-0752.yml +92 -0
- data/data/ruby-advisory-db/gems/activemodel/CVE-2016-0753.yml +92 -0
- data/data/ruby-advisory-db/gems/activerecord-jdbc-adapter/OSVDB-114854.yml +20 -0
- data/data/ruby-advisory-db/gems/activerecord-oracle_enhanced-adapter/OSVDB-95376.yml +15 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2014-3514.yml +23 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2015-7577.yml +107 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-108664.yml +23 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-108665.yml +24 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-88661.yml +20 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-90072.yml +3 -3
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-90073.yml +3 -3
- data/data/ruby-advisory-db/gems/activeresource/OSVDB-95749.yml +15 -0
- data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3226.yml +54 -0
- data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3227.yml +32 -0
- data/data/ruby-advisory-db/gems/as/OSVDB-112683.yml +10 -0
- data/data/ruby-advisory-db/gems/authlogic/OSVDB-89064.yml +15 -0
- data/data/ruby-advisory-db/gems/auto_awesomplete/OSVDB-132800.yml +11 -0
- data/data/ruby-advisory-db/gems/auto_select2/OSVDB-132800.yml +13 -0
- data/data/ruby-advisory-db/gems/awesome_spawn/CVE-2014-0156.yml +19 -0
- data/data/ruby-advisory-db/gems/backup-agoddard/OSVDB-108578.yml +8 -0
- data/data/ruby-advisory-db/gems/backup_checksum/OSVDB-108569.yml +12 -0
- data/data/ruby-advisory-db/gems/backup_checksum/OSVDB-108570.yml +10 -0
- data/data/ruby-advisory-db/gems/bcrypt-ruby/OSVDB-62067.yml +19 -0
- data/data/ruby-advisory-db/gems/bcrypt/OSVDB-62067.yml +17 -0
- data/data/ruby-advisory-db/gems/bio-basespace-sdk/OSVDB-101031.yml +8 -0
- data/data/ruby-advisory-db/gems/brbackup/OSVDB-108899.yml +12 -0
- data/data/ruby-advisory-db/gems/brbackup/OSVDB-108900.yml +11 -0
- data/data/ruby-advisory-db/gems/brbackup/OSVDB-108901.yml +11 -0
- data/data/ruby-advisory-db/gems/bson/CVE-2015-4412.yml +16 -0
- data/data/ruby-advisory-db/gems/builder/OSVDB-95668.yml +13 -0
- data/data/ruby-advisory-db/gems/bundler/OSVDB-110004.yml +15 -0
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115090.yml +13 -0
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115091.yml +12 -0
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115917.yml +12 -0
- data/data/ruby-advisory-db/gems/cap-strap/OSVDB-108574.yml +8 -0
- data/data/ruby-advisory-db/gems/cap-strap/OSVDB-108575.yml +7 -0
- data/data/ruby-advisory-db/gems/ciborg/OSVDB-108586.yml +8 -0
- data/data/ruby-advisory-db/gems/codders-dataset/OSVDB-108582.yml +8 -0
- data/data/ruby-advisory-db/gems/codders-dataset/OSVDB-108583.yml +8 -0
- data/data/ruby-advisory-db/gems/colorscore/CVE-2015-7541.yml +20 -0
- data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +0 -1
- data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +4 -4
- data/data/ruby-advisory-db/gems/curb/OSVDB-114600.yml +12 -0
- data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +7 -6
- data/data/ruby-advisory-db/gems/devise-two-factor/CVE-2015-7225.yml +22 -0
- data/data/ruby-advisory-db/gems/devise/CVE-2015-8314.yml +14 -0
- data/data/ruby-advisory-db/gems/devise/OSVDB-114435.yml +17 -0
- data/data/ruby-advisory-db/gems/devise/OSVDB-89642.yml +1 -1
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2014-8144.yml +26 -0
- data/data/ruby-advisory-db/gems/doorkeeper/OSVDB-118830.yml +17 -0
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-110439.yml +13 -0
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +8 -11
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-96798.yml +14 -0
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-97854.yml +12 -0
- data/data/ruby-advisory-db/gems/echor/OSVDB-102129.yml +7 -6
- data/data/ruby-advisory-db/gems/echor/OSVDB-102130.yml +6 -5
- data/data/ruby-advisory-db/gems/ember-source/CVE-2013-4170.yml +25 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0013.yml +33 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0014.yml +30 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml +26 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2015-1866.yml +26 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml +30 -0
- data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +6 -5
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101445.yml +17 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101446.yml +19 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101447.yml +17 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101448.yml +19 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101700.yml +16 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-110420.yml +19 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-118465.yml +17 -0
- data/data/ruby-advisory-db/gems/features/OSVDB-96975.yml +8 -0
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +0 -3
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +0 -3
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +0 -2
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90718.yml +7 -0
- data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +0 -1
- data/data/ruby-advisory-db/gems/flavour_saver/OSVDB-110796.yml +14 -0
- data/data/ruby-advisory-db/gems/flukso4r/OSVDB-101577.yml +7 -0
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-110439.yml +15 -0
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-90647.yml +16 -0
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-96798.yml +9 -6
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-97854.yml +12 -0
- data/data/ruby-advisory-db/gems/gnms/OSVDB-108594.yml +7 -0
- data/data/ruby-advisory-db/gems/gollum-grit_adapter/CVE-2014-9489.yml +23 -0
- data/data/ruby-advisory-db/gems/gollum/CVE-2015-7314.yml +13 -0
- data/data/ruby-advisory-db/gems/gyazo/OSVDB-108563.yml +10 -0
- data/data/ruby-advisory-db/gems/handlebars-source/OSVDB-131671.yml +17 -0
- data/data/ruby-advisory-db/gems/http/CVE-2015-1828.yml +14 -0
- data/data/ruby-advisory-db/gems/jquery-rails/CVE-2015-1840.yml +36 -0
- data/data/ruby-advisory-db/gems/jquery-ujs/CVE-2015-1840.yml +35 -0
- data/data/ruby-advisory-db/gems/jruby-openssl/CVE-2009-4123.yml +16 -0
- data/data/ruby-advisory-db/gems/jruby-sandbox/OSVDB-106279.yml +12 -0
- data/data/ruby-advisory-db/gems/json/OSVDB-101137.yml +17 -0
- data/data/ruby-advisory-db/gems/json/OSVDB-101157.yml +14 -0
- data/data/ruby-advisory-db/gems/json/OSVDB-90074.yml +1 -1
- data/data/ruby-advisory-db/gems/kafo/OSVDB-106826.yml +15 -0
- data/data/ruby-advisory-db/gems/kajam/OSVDB-108529.yml +12 -0
- data/data/ruby-advisory-db/gems/kajam/OSVDB-108530.yml +11 -0
- data/data/ruby-advisory-db/gems/karo/OSVDB-108573.yml +10 -0
- data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +0 -1
- data/data/ruby-advisory-db/gems/kcapifony/OSVDB-108571.yml +8 -0
- data/data/ruby-advisory-db/gems/kcapifony/OSVDB-108572.yml +7 -0
- data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +0 -1
- data/data/ruby-advisory-db/gems/kompanee-recipes/OSVDB-108593.yml +12 -0
- data/data/ruby-advisory-db/gems/lawn-login/OSVDB-108576.yml +8 -0
- data/data/ruby-advisory-db/gems/ldap_fluff/OSVDB-90579.yml +15 -0
- data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +0 -1
- data/data/ruby-advisory-db/gems/lean-ruport/OSVDB-108581.yml +8 -0
- data/data/ruby-advisory-db/gems/lingq/OSVDB-108585.yml +7 -0
- data/data/ruby-advisory-db/gems/lynx/OSVDB-108579.yml +7 -0
- data/data/ruby-advisory-db/gems/lynx/OSVDB-108580.yml +8 -0
- data/data/ruby-advisory-db/gems/mail/OSVDB-131677.yml +19 -0
- data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml +21 -0
- data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-132871.yml +22 -0
- data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +0 -1
- data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +5 -5
- data/data/ruby-advisory-db/gems/moped/CVE-2015-4410.yml +17 -0
- data/data/ruby-advisory-db/gems/mustache-js-rails/OSVDB-131671.yml +17 -0
- data/data/ruby-advisory-db/gems/net-ldap/OSVDB-106108.yml +14 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-1819.yml +52 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-5312.yml +92 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml +37 -0
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101179.yml +11 -5
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-118481.yml +15 -0
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-90946.yml +15 -0
- data/data/ruby-advisory-db/gems/open-uri-cached/OSVDB-121701.yml +13 -0
- data/data/ruby-advisory-db/gems/paperclip/CVE-2015-2963.yml +16 -0
- data/data/ruby-advisory-db/gems/paratrooper-newrelic/OSVDB-101839.yml +6 -5
- data/data/ruby-advisory-db/gems/paratrooper-pingdom/OSVDB-101847.yml +6 -6
- data/data/ruby-advisory-db/gems/passenger/CVE-2014-1831.yml +13 -0
- data/data/ruby-advisory-db/gems/passenger/CVE-2014-1832.yml +13 -0
- data/data/ruby-advisory-db/gems/passenger/CVE-2015-7519.yml +17 -0
- data/data/ruby-advisory-db/gems/passenger/OSVDB-90738.yml +16 -0
- data/data/ruby-advisory-db/gems/passenger/OSVDB-93752.yml +15 -0
- data/data/ruby-advisory-db/gems/passenger/OSVDB-94074.yml +14 -0
- data/data/ruby-advisory-db/gems/point-cli/OSVDB-108577.yml +8 -0
- data/data/ruby-advisory-db/gems/quick_magick/OSVDB-106954.yml +7 -0
- data/data/ruby-advisory-db/gems/rack-attack/OSVDB-132234.yml +26 -0
- data/data/ruby-advisory-db/gems/rack-ssl/OSVDB-104734.yml +11 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2015-3225.yml +18 -0
- data/data/ruby-advisory-db/gems/rack/OSVDB-78121.yml +21 -0
- data/data/ruby-advisory-db/gems/rack/OSVDB-89317.yml +21 -0
- data/data/ruby-advisory-db/gems/rack/OSVDB-89320.yml +19 -0
- data/data/ruby-advisory-db/gems/rack/OSVDB-89327.yml +20 -0
- data/data/ruby-advisory-db/gems/rack/OSVDB-89938.yml +18 -0
- data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +9 -9
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7578.yml +47 -0
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7579.yml +75 -0
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7580.yml +70 -0
- data/data/ruby-advisory-db/gems/rbovirt/OSVDB-104080.yml +1 -1
- data/data/ruby-advisory-db/gems/redcarpet/CVE-2015-5147.yml +17 -0
- data/data/ruby-advisory-db/gems/redcarpet/OSVDB-120415.yml +16 -0
- data/data/ruby-advisory-db/gems/redis-namespace/OSVDB-96425.yml +4 -5
- data/data/ruby-advisory-db/gems/refile/OSVDB-120857.yml +16 -0
- data/data/ruby-advisory-db/gems/rest-client/CVE-2015-1820.yml +23 -0
- data/data/ruby-advisory-db/gems/rest-client/OSVDB-117461.yml +13 -0
- data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +9 -8
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-117903.yml +13 -0
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124383.yml +11 -0
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124991.yml +13 -0
- data/data/ruby-advisory-db/gems/screen_capture/OSVDB-107783.yml +7 -0
- data/data/ruby-advisory-db/gems/sentry-raven/OSVDB-115654.yml +14 -0
- data/data/ruby-advisory-db/gems/sfpagent/OSVDB-105971.yml +9 -7
- data/data/ruby-advisory-db/gems/show_in_browser/OSVDB-93490.yml +8 -0
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126329.yml +12 -0
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126330.yml +10 -0
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126331.yml +14 -0
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125675.yml +9 -0
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125676.yml +14 -0
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125678.yml +9 -0
- data/data/ruby-advisory-db/gems/sounder/OSVDB-96278.yml +5 -4
- data/data/ruby-advisory-db/gems/spree/OSVDB-119205.yml +18 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-125699.yml +18 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-125701.yml +17 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-125712.yml +16 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-125713.yml +15 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-69098.yml +19 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-73751.yml +11 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-76011.yml +15 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-81505.yml +14 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-81506.yml +16 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-90865.yml +20 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +9 -3
- data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +9 -3
- data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +9 -3
- data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +9 -3
- data/data/ruby-advisory-db/gems/spree_auth/OSVDB-90865.yml +16 -0
- data/data/ruby-advisory-db/gems/spree_auth_devise/OSVDB-90865.yml +20 -0
- data/data/ruby-advisory-db/gems/sprockets/CVE-2014-7819.yml +27 -0
- data/data/ruby-advisory-db/gems/sprout/OSVDB-100598.yml +7 -5
- data/data/ruby-advisory-db/gems/sup/CVE-2013-4478.yml +14 -0
- data/data/ruby-advisory-db/gems/sup/CVE-2013-4479.yml +14 -0
- data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +0 -1
- data/data/ruby-advisory-db/gems/twitter-bootstrap-rails/OSVDB-109206.yml +22 -0
- data/data/ruby-advisory-db/gems/uglifier/OSVDB-126747.yml +19 -0
- data/data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml +22 -0
- data/data/ruby-advisory-db/gems/web-console/OSVDB-112346.yml +12 -0
- data/data/ruby-advisory-db/gems/webbynode/OSVDB-100920.yml +4 -3
- data/data/ruby-advisory-db/gems/wicked/OSVDB-98270.yml +2 -2
- data/data/ruby-advisory-db/gems/xaviershay-dm-rails/OSVDB-118579.yml +13 -0
- data/data/ruby-advisory-db/lib/cf_scrape.py +5 -0
- data/data/ruby-advisory-db/lib/{scrape.rb → osvdb_scrape.rb} +16 -11
- data/data/ruby-advisory-db/libraries/rubygems/CVE-2013-4287.yml +19 -0
- data/data/ruby-advisory-db/libraries/rubygems/CVE-2013-4363.yml +20 -0
- data/data/ruby-advisory-db/libraries/rubygems/CVE-2015-3900.yml +19 -0
- data/data/ruby-advisory-db/libraries/rubygems/CVE-2015-4020.yml +19 -0
- data/data/ruby-advisory-db/libraries/rubygems/OSVDB-33561.yml +17 -0
- data/data/ruby-advisory-db/libraries/rubygems/OSVDB-81444.yml +14 -0
- data/data/ruby-advisory-db/libraries/rubygems/OSVDB-85809.yml +16 -0
- data/data/ruby-advisory-db/rubies/jruby/CVE-2010-1330.yml +17 -0
- data/data/ruby-advisory-db/rubies/jruby/CVE-2011-4838.yml +15 -0
- data/data/ruby-advisory-db/rubies/jruby/CVE-2012-5370.yml +17 -0
- data/data/ruby-advisory-db/rubies/jruby/OSVDB-94644.yml +12 -0
- data/data/ruby-advisory-db/rubies/rbx/OSVDB-78119.yml +13 -0
- data/data/ruby-advisory-db/rubies/rbx/OSVDB-87861.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5162.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5770.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1447.yml +15 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1891.yml +21 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2376.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3443.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3655.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3656.yml +19 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3657.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3905.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-0642.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-5147.yml +13 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-0188.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2705.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-3009.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4464.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4466.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4481.yml +15 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml +19 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-100113.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-105027.yml +20 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-107478.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-108971.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-113747.yml +19 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-114641.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-120541.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-46550.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-46551.yml +21 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-46552.yml +21 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-46553.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-46554.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-47753.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-55031.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-60880.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-61774.yml +20 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-65556.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-66040.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-70957.yml +15 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-70958.yml +20 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-74829.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-78118.yml +14 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-87280.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-87863.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-87917.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-90587.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-93414.yml +19 -0
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-94628.yml +21 -0
- data/data/ruby-advisory-db/scripts/post-advisories.sh +18 -0
- data/data/ruby-advisory-db/spec/advisory_example.rb +59 -37
- data/data/ruby-advisory-db/spec/gem_example.rb +22 -0
- data/data/ruby-advisory-db/spec/gems_spec.rb +18 -2
- data/data/ruby-advisory-db/spec/library_example.rb +21 -0
- data/data/ruby-advisory-db/spec/ruby_example.rb +23 -0
- data/lib/bundler/audit.rb +1 -1
- data/lib/bundler/audit/advisory.rb +21 -1
- data/lib/bundler/audit/cli.rb +14 -2
- data/lib/bundler/audit/database.rb +7 -4
- data/lib/bundler/audit/scanner.rb +24 -9
- data/lib/bundler/audit/task.rb +31 -0
- data/lib/bundler/audit/version.rb +2 -2
- data/spec/advisory_spec.rb +68 -24
- data/spec/cli_spec.rb +44 -0
- data/spec/integration_spec.rb +22 -0
- data/spec/spec_helper.rb +1 -0
- metadata +246 -4
@@ -0,0 +1,55 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2015-7581
|
5
|
+
date: 2016-01-25
|
6
|
+
url: "https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE"
|
7
|
+
|
8
|
+
title: Object leak vulnerability for wildcard controller routes in Action Pack
|
9
|
+
|
10
|
+
description: |
|
11
|
+
There is an object leak vulnerability for wildcard controllers in Action Pack.
|
12
|
+
This vulnerability has been assigned the CVE identifier CVE-2015-7581.
|
13
|
+
|
14
|
+
Versions Affected: >= 4.0.0 and < 5.0.0.beta1
|
15
|
+
Not affected: < 4.0.0, 5.0.0.beta1 and newer
|
16
|
+
Fixed Versions: 4.2.5.1, 4.1.14.1
|
17
|
+
|
18
|
+
Impact
|
19
|
+
------
|
20
|
+
Users that have a route that contains the string ":controller" are susceptible
|
21
|
+
to objects being leaked globally which can lead to unbounded memory growth.
|
22
|
+
To identify if your application is vulnerable, look for routes that contain
|
23
|
+
":controller".
|
24
|
+
|
25
|
+
Internally, Action Pack keeps a map of "url controller name" to "controller
|
26
|
+
class name". This map is cached globally, and is populated even if the
|
27
|
+
controller class doesn't actually exist.
|
28
|
+
|
29
|
+
All users running an affected release should either upgrade or use one of the
|
30
|
+
workarounds immediately.
|
31
|
+
|
32
|
+
Releases
|
33
|
+
--------
|
34
|
+
The FIXED releases are available at the normal locations.
|
35
|
+
|
36
|
+
Workarounds
|
37
|
+
-----------
|
38
|
+
There are no feasible workarounds for this issue.
|
39
|
+
|
40
|
+
Patches
|
41
|
+
-------
|
42
|
+
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
|
43
|
+
|
44
|
+
* 4-1-wildcard_route.patch - Patch for 4.1 series
|
45
|
+
* 4-2-wildcard_route.patch - Patch for 4.2 series
|
46
|
+
|
47
|
+
Please note that only the 4.1.x and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
|
48
|
+
|
49
|
+
unaffected_versions:
|
50
|
+
- "< 4.0.0"
|
51
|
+
- ">= 5.0.0.beta1"
|
52
|
+
|
53
|
+
patched_versions:
|
54
|
+
- "~> 4.2.5.1"
|
55
|
+
- "~> 4.1.14.1"
|
@@ -0,0 +1,71 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2016-0751
|
5
|
+
date: 2016-01-25
|
6
|
+
url: "https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc"
|
7
|
+
|
8
|
+
title: Possible Object Leak and Denial of Service attack in Action Pack
|
9
|
+
|
10
|
+
description: |
|
11
|
+
There is a possible object leak which can lead to a denial of service
|
12
|
+
vulnerability in Action Pack. This vulnerability has been
|
13
|
+
assigned the CVE identifier CVE-2016-0751.
|
14
|
+
|
15
|
+
Versions Affected: All.
|
16
|
+
Not affected: None.
|
17
|
+
Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
|
18
|
+
|
19
|
+
Impact
|
20
|
+
------
|
21
|
+
A carefully crafted accept header can cause a global cache of mime types to
|
22
|
+
grow indefinitely which can lead to a possible denial of service attack in
|
23
|
+
Action Pack.
|
24
|
+
|
25
|
+
All users running an affected release should either upgrade or use one of the
|
26
|
+
workarounds immediately.
|
27
|
+
|
28
|
+
Releases
|
29
|
+
--------
|
30
|
+
The FIXED releases are available at the normal locations.
|
31
|
+
|
32
|
+
Workarounds
|
33
|
+
-----------
|
34
|
+
This attack can be mitigated by a proxy that only allows known mime types in
|
35
|
+
the Accept header.
|
36
|
+
|
37
|
+
Placing the following code in an initializer will also mitigate the issue:
|
38
|
+
|
39
|
+
```ruby
|
40
|
+
require 'action_dispatch/http/mime_type'
|
41
|
+
|
42
|
+
Mime.const_set :LOOKUP, Hash.new { |h,k|
|
43
|
+
Mime::Type.new(k) unless k.blank?
|
44
|
+
}
|
45
|
+
```
|
46
|
+
|
47
|
+
Patches
|
48
|
+
-------
|
49
|
+
To aid users who aren't able to upgrade immediately we have provided patches for
|
50
|
+
the two supported release series. They are in git-am format and consist of a
|
51
|
+
single changeset.
|
52
|
+
|
53
|
+
* 5-0-mime_types_leak.patch - Patch for 5.0 series
|
54
|
+
* 4-2-mime_types_leak.patch - Patch for 4.2 series
|
55
|
+
* 4-1-mime_types_leak.patch - Patch for 4.1 series
|
56
|
+
* 3-2-mime_types_leak.patch - Patch for 3.2 series
|
57
|
+
|
58
|
+
Please note that only the 4.1.x and 4.2.x series are supported at present. Users
|
59
|
+
of earlier unsupported releases are advised to upgrade as soon as possible as we
|
60
|
+
cannot guarantee the continued availability of security fixes for unsupported
|
61
|
+
releases.
|
62
|
+
|
63
|
+
Credits
|
64
|
+
-------
|
65
|
+
Aaron Patterson <3<3
|
66
|
+
|
67
|
+
patched_versions:
|
68
|
+
- "~> 5.0.0.beta1.1"
|
69
|
+
- "~> 4.2.5.1"
|
70
|
+
- "~> 4.1.14.1"
|
71
|
+
- "~> 3.2.22.1"
|
@@ -8,10 +8,10 @@ title: Denial of Service Vulnerability in Action View
|
|
8
8
|
date: 2013-12-03
|
9
9
|
|
10
10
|
description: |
|
11
|
-
There is a denial of service vulnerability in the header handling component of
|
11
|
+
There is a denial of service vulnerability in the header handling component of
|
12
12
|
Action View.
|
13
13
|
|
14
|
-
cvss_v2:
|
14
|
+
cvss_v2: 5.0
|
15
15
|
|
16
16
|
unaffected_versions:
|
17
17
|
- ~> 2.3.0
|
@@ -9,14 +9,14 @@ date: 2013-12-03
|
|
9
9
|
|
10
10
|
description: |
|
11
11
|
There is a vulnerability in the simple_format helper in Ruby on Rails.
|
12
|
-
The simple_format helper converts user supplied text into html text
|
13
|
-
which is intended to be safe for display. A change made to the
|
14
|
-
implementation of this helper means that any user provided HTML
|
15
|
-
attributes will not be escaped correctly. As a result of this error,
|
16
|
-
applications which pass user-controlled data to be included as html
|
12
|
+
The simple_format helper converts user supplied text into html text
|
13
|
+
which is intended to be safe for display. A change made to the
|
14
|
+
implementation of this helper means that any user provided HTML
|
15
|
+
attributes will not be escaped correctly. As a result of this error,
|
16
|
+
applications which pass user-controlled data to be included as html
|
17
17
|
attributes will be vulnerable to an XSS attack.
|
18
18
|
|
19
|
-
cvss_v2:
|
19
|
+
cvss_v2: 4.3
|
20
20
|
|
21
21
|
unaffected_versions:
|
22
22
|
- ~> 2.3.0
|
@@ -15,9 +15,9 @@ description: |
|
|
15
15
|
parameters insecurely and store them in the same key that Rails uses
|
16
16
|
for its own parameters. In the event that happens the application
|
17
17
|
will receive unsafe parameters and could be vulnerable to the earlier
|
18
|
-
vulnerability.
|
18
|
+
vulnerability.
|
19
19
|
|
20
|
-
cvss_v2:
|
20
|
+
cvss_v2: 6.4
|
21
21
|
|
22
22
|
patched_versions:
|
23
23
|
- ~> 3.2.16
|
@@ -11,11 +11,11 @@ description: |
|
|
11
11
|
There is a vulnerability in the internationalization component of Ruby on
|
12
12
|
Rails. Under certain common configurations an attacker can provide specially
|
13
13
|
crafted input which will execute a reflective XSS attack.
|
14
|
-
|
14
|
+
|
15
15
|
The root cause of this issue is a vulnerability in the i18n gem which has
|
16
16
|
been assigned the identifier CVE-2013-4492.
|
17
17
|
|
18
|
-
cvss_v2:
|
18
|
+
cvss_v2: 4.3
|
19
19
|
|
20
20
|
patched_versions:
|
21
21
|
- ~> 3.2.16
|
@@ -0,0 +1,18 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2011-3186
|
5
|
+
osvdb: 74616
|
6
|
+
url: https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g
|
7
|
+
title: Response Splitting Vulnerability in Ruby on Rails
|
8
|
+
date: 2011-08-16
|
9
|
+
|
10
|
+
description: |
|
11
|
+
A response splitting flaw in Ruby on Rails 2.3.x was reported that could allow
|
12
|
+
a remote attacker to inject arbitrary HTTP headers into a response due to
|
13
|
+
insufficient sanitization of the values provided for response content types.
|
14
|
+
|
15
|
+
cvss_v2: 4.3
|
16
|
+
|
17
|
+
patched_versions:
|
18
|
+
- ">= 2.3.13"
|
@@ -0,0 +1,23 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2011-4319
|
5
|
+
osvdb: 77199
|
6
|
+
url: https://groups.google.com/forum/#!topic/rubyonrails-security/K2HXD7c8fMU
|
7
|
+
title: XSS vulnerability in the translate helper method in Ruby on Rails
|
8
|
+
date: 2011-11-17
|
9
|
+
|
10
|
+
description: |
|
11
|
+
A cross-site scripting (XSS) flaw was found in the way the 'translate' helper
|
12
|
+
method of the Ruby on Rails performed HTML escaping of interpolated user
|
13
|
+
input, when interpolation in combination with HTML-safe translations were
|
14
|
+
used. A remote attacker could use this flaw to execute arbitrary HTML or web
|
15
|
+
script by providing a specially-crafted input to Ruby on Rails application,
|
16
|
+
using the ActionPack module and its 'translate' helper method without explicit
|
17
|
+
(application specific) sanitization of user provided input.
|
18
|
+
|
19
|
+
cvss_v2: 4.3
|
20
|
+
|
21
|
+
patched_versions:
|
22
|
+
- "~> 3.0.11"
|
23
|
+
- ">= 3.1.2"
|
@@ -1,10 +1,10 @@
|
|
1
|
-
---
|
1
|
+
---
|
2
2
|
gem: actionpack
|
3
3
|
framework: rails
|
4
4
|
cve: 2012-3424
|
5
5
|
osvdb: 84243
|
6
6
|
url: http://www.osvdb.org/show/osvdb/84243
|
7
|
-
title:
|
7
|
+
title:
|
8
8
|
Ruby on Rails actionpack/lib/action_controller/metal/http_authentication.rb
|
9
9
|
with_http_digest Helper Method Remote DoS
|
10
10
|
date: 2012-07-26
|
@@ -16,12 +16,12 @@ description: |
|
|
16
16
|
with_http_digest helper method is being used. This may allow a remote
|
17
17
|
attacker to cause a loss of availability for the program.
|
18
18
|
|
19
|
-
cvss_v2:
|
19
|
+
cvss_v2: 5.0
|
20
20
|
|
21
21
|
unaffected_versions:
|
22
22
|
- ">= 2.3.5, <= 2.3.14"
|
23
23
|
|
24
|
-
patched_versions:
|
24
|
+
patched_versions:
|
25
25
|
- ~> 3.0.16
|
26
26
|
- ~> 3.1.7
|
27
27
|
- ">= 3.2.7"
|
@@ -1,4 +1,4 @@
|
|
1
|
-
---
|
1
|
+
---
|
2
2
|
gem: actionpack
|
3
3
|
framework: rails
|
4
4
|
cve: 2013-1855
|
@@ -7,14 +7,14 @@ url: http://www.osvdb.org/show/osvdb/91452
|
|
7
7
|
title: XSS vulnerability in sanitize_css in Action Pack
|
8
8
|
date: 2013-03-19
|
9
9
|
|
10
|
-
description: |
|
10
|
+
description: |
|
11
11
|
There is an XSS vulnerability in the `sanitize_css` method in Action
|
12
12
|
Pack. Carefully crafted text can bypass the sanitization provided in
|
13
13
|
the `sanitize_css` method in Action Pack
|
14
14
|
|
15
|
-
cvss_v2: 4.
|
15
|
+
cvss_v2: 4.3
|
16
16
|
|
17
|
-
patched_versions:
|
17
|
+
patched_versions:
|
18
18
|
- ~> 2.3.18
|
19
19
|
- ~> 3.1.12
|
20
20
|
- ">= 3.2.13"
|
@@ -1,4 +1,4 @@
|
|
1
|
-
---
|
1
|
+
---
|
2
2
|
gem: actionpack
|
3
3
|
framework: rails
|
4
4
|
cve: 2013-1857
|
@@ -7,7 +7,7 @@ url: http://osvdb.org/show/osvdb/91454
|
|
7
7
|
title: XSS Vulnerability in the `sanitize` helper of Ruby on Rails
|
8
8
|
date: 2013-03-19
|
9
9
|
|
10
|
-
description: |
|
10
|
+
description: |
|
11
11
|
The sanitize helper in Ruby on Rails is designed to
|
12
12
|
filter HTML and remove all tags and attributes which could be
|
13
13
|
malicious. The code which ensured that URLs only contain supported
|
@@ -15,9 +15,9 @@ description: |
|
|
15
15
|
embed a tag containing a URL which executes arbitrary javascript
|
16
16
|
code.
|
17
17
|
|
18
|
-
cvss_v2: 4.
|
18
|
+
cvss_v2: 4.3
|
19
19
|
|
20
|
-
patched_versions:
|
20
|
+
patched_versions:
|
21
21
|
- ~> 2.3.18
|
22
22
|
- ~> 3.1.12
|
23
23
|
- ">= 3.2.13"
|
@@ -0,0 +1,92 @@
|
|
1
|
+
---
|
2
|
+
gem: actionview
|
3
|
+
framework: rails
|
4
|
+
cve: 2016-0752
|
5
|
+
date: 2016-01-25
|
6
|
+
url: "https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00"
|
7
|
+
|
8
|
+
title: Possible Information Leak Vulnerability in Action View
|
9
|
+
description: |
|
10
|
+
There is a possible directory traversal and information leak vulnerability in
|
11
|
+
Action View. This vulnerability has been assigned the CVE identifier
|
12
|
+
CVE-2016-0752.
|
13
|
+
|
14
|
+
Versions Affected: All.
|
15
|
+
Not affected: None.
|
16
|
+
Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
|
17
|
+
|
18
|
+
Impact
|
19
|
+
------
|
20
|
+
Applications that pass unverified user input to the `render` method in a
|
21
|
+
controller may be vulnerable to an information leak vulnerability.
|
22
|
+
|
23
|
+
Impacted code will look something like this:
|
24
|
+
|
25
|
+
```ruby
|
26
|
+
def index
|
27
|
+
render params[:id]
|
28
|
+
end
|
29
|
+
```
|
30
|
+
|
31
|
+
Carefully crafted requests can cause the above code to render files from
|
32
|
+
unexpected places like outside the application's view directory, and can
|
33
|
+
possibly escalate this to a remote code execution attack.
|
34
|
+
|
35
|
+
All users running an affected release should either upgrade or use one of the
|
36
|
+
workarounds immediately.
|
37
|
+
|
38
|
+
Releases
|
39
|
+
--------
|
40
|
+
The FIXED releases are available at the normal locations.
|
41
|
+
|
42
|
+
Workarounds
|
43
|
+
-----------
|
44
|
+
A workaround to this issue is to not pass arbitrary user input to the `render`
|
45
|
+
method. Instead, verify that data before passing it to the `render` method.
|
46
|
+
|
47
|
+
For example, change this:
|
48
|
+
|
49
|
+
```ruby
|
50
|
+
def index
|
51
|
+
render params[:id]
|
52
|
+
end
|
53
|
+
```
|
54
|
+
|
55
|
+
To this:
|
56
|
+
|
57
|
+
```ruby
|
58
|
+
def index
|
59
|
+
render verify_template(params[:id])
|
60
|
+
end
|
61
|
+
|
62
|
+
private
|
63
|
+
def verify_template(name)
|
64
|
+
# add verification logic particular to your application here
|
65
|
+
end
|
66
|
+
```
|
67
|
+
|
68
|
+
Patches
|
69
|
+
-------
|
70
|
+
To aid users who aren't able to upgrade immediately we have provided patches for
|
71
|
+
the two supported release series. They are in git-am format and consist of a
|
72
|
+
single changeset.
|
73
|
+
|
74
|
+
* 3-2-render_data_leak.patch - Patch for 3.2 series
|
75
|
+
* 4-1-render_data_leak.patch - Patch for 4.1 series
|
76
|
+
* 4-2-render_data_leak.patch - Patch for 4.2 series
|
77
|
+
* 5-0-render_data_leak.patch - Patch for 5.0 series
|
78
|
+
|
79
|
+
Please note that only the 4.1.x and 4.2.x series are supported at present. Users
|
80
|
+
of earlier unsupported releases are advised to upgrade as soon as possible as we
|
81
|
+
cannot guarantee the continued availability of security fixes for unsupported
|
82
|
+
releases.
|
83
|
+
|
84
|
+
Credits
|
85
|
+
-------
|
86
|
+
Thanks John Poulin for reporting this!
|
87
|
+
|
88
|
+
patched_versions:
|
89
|
+
- "~> 5.0.0.beta1.1"
|
90
|
+
- "~> 4.2.5.1"
|
91
|
+
- "~> 4.1.14.1"
|
92
|
+
- "~> 3.2.22.1"
|
@@ -0,0 +1,92 @@
|
|
1
|
+
---
|
2
|
+
gem: activemodel
|
3
|
+
framework: rails
|
4
|
+
cve: 2016-0753
|
5
|
+
date: 2016-01-25
|
6
|
+
url: "https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ"
|
7
|
+
|
8
|
+
title: Possible Input Validation Circumvention in Active Model
|
9
|
+
|
10
|
+
description: |
|
11
|
+
There is a possible input validation circumvention vulnerability in Active
|
12
|
+
Model. This vulnerability has been assigned the CVE identifier CVE-2016-0753.
|
13
|
+
|
14
|
+
Versions Affected: 4.1.0 and newer
|
15
|
+
Not affected: 4.0.13 and older
|
16
|
+
Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1
|
17
|
+
|
18
|
+
Impact
|
19
|
+
------
|
20
|
+
Code that uses Active Model based models (including Active Record models) and
|
21
|
+
does not validate user input before passing it to the model can be subject to
|
22
|
+
an attack where specially crafted input will cause the model to skip
|
23
|
+
validations.
|
24
|
+
|
25
|
+
Vulnerable code will look something like this:
|
26
|
+
|
27
|
+
```ruby
|
28
|
+
SomeModel.new(unverified_user_input)
|
29
|
+
```
|
30
|
+
|
31
|
+
Rails users using Strong Parameters are generally not impacted by this issue
|
32
|
+
as they are encouraged to whitelist parameters and must specifically opt-out
|
33
|
+
of input verification using the `permit!` method to allow mass assignment.
|
34
|
+
|
35
|
+
For example, a vulnerable Rails application will have code that looks like
|
36
|
+
this:
|
37
|
+
|
38
|
+
```ruby
|
39
|
+
def create
|
40
|
+
params.permit! # allow all parameters
|
41
|
+
@user = User.new params[:users]
|
42
|
+
end
|
43
|
+
```
|
44
|
+
|
45
|
+
Active Model and Active Record objects are not equipped to handle arbitrary
|
46
|
+
user input. It is up to the application to verify input before passing it to
|
47
|
+
Active Model models. Rails users already have Strong Parameters in place to
|
48
|
+
handle white listing, but applications using Active Model and Active Record
|
49
|
+
outside of a Rails environment may be impacted.
|
50
|
+
|
51
|
+
All users running an affected release should either upgrade or use one of the
|
52
|
+
workarounds immediately.
|
53
|
+
|
54
|
+
Releases
|
55
|
+
--------
|
56
|
+
The FIXED releases are available at the normal locations.
|
57
|
+
|
58
|
+
Workarounds
|
59
|
+
-----------
|
60
|
+
There are several workarounds depending on the application. Inside a Rails
|
61
|
+
application, stop using `permit!`. Outside a Rails application, either use
|
62
|
+
Hash#slice to select the parameters you need, or integrate Strong Parameters
|
63
|
+
with your application.
|
64
|
+
|
65
|
+
Patches
|
66
|
+
-------
|
67
|
+
To aid users who aren't able to upgrade immediately we have provided patches for
|
68
|
+
the two supported release series. They are in git-am format and consist of a
|
69
|
+
single changeset.
|
70
|
+
|
71
|
+
* 4-1-validation_skip.patch - Patch for 4.1 series
|
72
|
+
* 4-2-validation_skip.patch - Patch for 4.2 series
|
73
|
+
* 5-0-validation_skip.patch - Patch for 5.0 series
|
74
|
+
|
75
|
+
Please note that only the 4.1.x and 4.2.x series are supported at present. Users
|
76
|
+
of earlier unsupported releases are advised to upgrade as soon as possible as we
|
77
|
+
cannot guarantee the continued availability of security fixes for unsupported
|
78
|
+
releases.
|
79
|
+
|
80
|
+
Credits
|
81
|
+
-------
|
82
|
+
Thanks to:
|
83
|
+
|
84
|
+
[John Backus](https://github.com/backus) from BlockScore for reporting this!
|
85
|
+
|
86
|
+
unaffected_versions:
|
87
|
+
- "<= 4.0.13"
|
88
|
+
|
89
|
+
patched_versions:
|
90
|
+
- "~> 5.0.0.beta1.1"
|
91
|
+
- "~> 4.2.5.1"
|
92
|
+
- "~> 4.1.14.1"
|