bundler-audit 0.4.0 → 0.5.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (313) hide show
  1. checksums.yaml +4 -4
  2. data/ChangeLog.md +16 -0
  3. data/README.md +23 -10
  4. data/data/ruby-advisory-db.ts +1 -1
  5. data/data/ruby-advisory-db/.gitignore +1 -0
  6. data/data/ruby-advisory-db/.travis.yml +18 -0
  7. data/data/ruby-advisory-db/CONTRIBUTING.md +53 -3
  8. data/data/ruby-advisory-db/CONTRIBUTORS.md +17 -2
  9. data/data/ruby-advisory-db/Gemfile +8 -2
  10. data/data/ruby-advisory-db/Rakefile +1 -2
  11. data/data/ruby-advisory-db/gems/{arabic-prawn → Arabic-Prawn}/OSVDB-104365.yml +3 -6
  12. data/data/ruby-advisory-db/gems/RedCloth/OSVDB-115941.yml +16 -0
  13. data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4995.yml +13 -0
  14. data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4996.yml +13 -0
  15. data/data/ruby-advisory-db/gems/actionpack/CVE-2014-0130.yml +23 -0
  16. data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7818.yml +24 -0
  17. data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7829.yml +26 -0
  18. data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7576.yml +116 -0
  19. data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7581.yml +55 -0
  20. data/data/ruby-advisory-db/gems/actionpack/CVE-2016-0751.yml +71 -0
  21. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +1 -1
  22. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +2 -2
  23. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +6 -6
  24. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +2 -2
  25. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +2 -2
  26. data/data/ruby-advisory-db/gems/actionpack/OSVDB-103439.yml +1 -1
  27. data/data/ruby-advisory-db/gems/actionpack/OSVDB-103440.yml +1 -1
  28. data/data/ruby-advisory-db/gems/actionpack/OSVDB-74616.yml +18 -0
  29. data/data/ruby-advisory-db/gems/actionpack/OSVDB-77199.yml +23 -0
  30. data/data/ruby-advisory-db/gems/actionpack/OSVDB-84243.yml +4 -4
  31. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +4 -4
  32. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +4 -4
  33. data/data/ruby-advisory-db/gems/actionview/CVE-2016-0752.yml +92 -0
  34. data/data/ruby-advisory-db/gems/activemodel/CVE-2016-0753.yml +92 -0
  35. data/data/ruby-advisory-db/gems/activerecord-jdbc-adapter/OSVDB-114854.yml +20 -0
  36. data/data/ruby-advisory-db/gems/activerecord-oracle_enhanced-adapter/OSVDB-95376.yml +15 -0
  37. data/data/ruby-advisory-db/gems/activerecord/CVE-2014-3514.yml +23 -0
  38. data/data/ruby-advisory-db/gems/activerecord/CVE-2015-7577.yml +107 -0
  39. data/data/ruby-advisory-db/gems/activerecord/OSVDB-108664.yml +23 -0
  40. data/data/ruby-advisory-db/gems/activerecord/OSVDB-108665.yml +24 -0
  41. data/data/ruby-advisory-db/gems/activerecord/OSVDB-88661.yml +20 -0
  42. data/data/ruby-advisory-db/gems/activerecord/OSVDB-90072.yml +3 -3
  43. data/data/ruby-advisory-db/gems/activerecord/OSVDB-90073.yml +3 -3
  44. data/data/ruby-advisory-db/gems/activeresource/OSVDB-95749.yml +15 -0
  45. data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3226.yml +54 -0
  46. data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3227.yml +32 -0
  47. data/data/ruby-advisory-db/gems/as/OSVDB-112683.yml +10 -0
  48. data/data/ruby-advisory-db/gems/authlogic/OSVDB-89064.yml +15 -0
  49. data/data/ruby-advisory-db/gems/auto_awesomplete/OSVDB-132800.yml +11 -0
  50. data/data/ruby-advisory-db/gems/auto_select2/OSVDB-132800.yml +13 -0
  51. data/data/ruby-advisory-db/gems/awesome_spawn/CVE-2014-0156.yml +19 -0
  52. data/data/ruby-advisory-db/gems/backup-agoddard/OSVDB-108578.yml +8 -0
  53. data/data/ruby-advisory-db/gems/backup_checksum/OSVDB-108569.yml +12 -0
  54. data/data/ruby-advisory-db/gems/backup_checksum/OSVDB-108570.yml +10 -0
  55. data/data/ruby-advisory-db/gems/bcrypt-ruby/OSVDB-62067.yml +19 -0
  56. data/data/ruby-advisory-db/gems/bcrypt/OSVDB-62067.yml +17 -0
  57. data/data/ruby-advisory-db/gems/bio-basespace-sdk/OSVDB-101031.yml +8 -0
  58. data/data/ruby-advisory-db/gems/brbackup/OSVDB-108899.yml +12 -0
  59. data/data/ruby-advisory-db/gems/brbackup/OSVDB-108900.yml +11 -0
  60. data/data/ruby-advisory-db/gems/brbackup/OSVDB-108901.yml +11 -0
  61. data/data/ruby-advisory-db/gems/bson/CVE-2015-4412.yml +16 -0
  62. data/data/ruby-advisory-db/gems/builder/OSVDB-95668.yml +13 -0
  63. data/data/ruby-advisory-db/gems/bundler/OSVDB-110004.yml +15 -0
  64. data/data/ruby-advisory-db/gems/bundler/OSVDB-115090.yml +13 -0
  65. data/data/ruby-advisory-db/gems/bundler/OSVDB-115091.yml +12 -0
  66. data/data/ruby-advisory-db/gems/bundler/OSVDB-115917.yml +12 -0
  67. data/data/ruby-advisory-db/gems/cap-strap/OSVDB-108574.yml +8 -0
  68. data/data/ruby-advisory-db/gems/cap-strap/OSVDB-108575.yml +7 -0
  69. data/data/ruby-advisory-db/gems/ciborg/OSVDB-108586.yml +8 -0
  70. data/data/ruby-advisory-db/gems/codders-dataset/OSVDB-108582.yml +8 -0
  71. data/data/ruby-advisory-db/gems/codders-dataset/OSVDB-108583.yml +8 -0
  72. data/data/ruby-advisory-db/gems/colorscore/CVE-2015-7541.yml +20 -0
  73. data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +0 -1
  74. data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +4 -4
  75. data/data/ruby-advisory-db/gems/curb/OSVDB-114600.yml +12 -0
  76. data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +7 -6
  77. data/data/ruby-advisory-db/gems/devise-two-factor/CVE-2015-7225.yml +22 -0
  78. data/data/ruby-advisory-db/gems/devise/CVE-2015-8314.yml +14 -0
  79. data/data/ruby-advisory-db/gems/devise/OSVDB-114435.yml +17 -0
  80. data/data/ruby-advisory-db/gems/devise/OSVDB-89642.yml +1 -1
  81. data/data/ruby-advisory-db/gems/doorkeeper/CVE-2014-8144.yml +26 -0
  82. data/data/ruby-advisory-db/gems/doorkeeper/OSVDB-118830.yml +17 -0
  83. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-110439.yml +13 -0
  84. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +8 -11
  85. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-96798.yml +14 -0
  86. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-97854.yml +12 -0
  87. data/data/ruby-advisory-db/gems/echor/OSVDB-102129.yml +7 -6
  88. data/data/ruby-advisory-db/gems/echor/OSVDB-102130.yml +6 -5
  89. data/data/ruby-advisory-db/gems/ember-source/CVE-2013-4170.yml +25 -0
  90. data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0013.yml +33 -0
  91. data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0014.yml +30 -0
  92. data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml +26 -0
  93. data/data/ruby-advisory-db/gems/ember-source/CVE-2015-1866.yml +26 -0
  94. data/data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml +30 -0
  95. data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +6 -5
  96. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101445.yml +17 -0
  97. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101446.yml +19 -0
  98. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101447.yml +17 -0
  99. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101448.yml +19 -0
  100. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101700.yml +16 -0
  101. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-110420.yml +19 -0
  102. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-118465.yml +17 -0
  103. data/data/ruby-advisory-db/gems/features/OSVDB-96975.yml +8 -0
  104. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +0 -3
  105. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +0 -3
  106. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +0 -2
  107. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90718.yml +7 -0
  108. data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +0 -1
  109. data/data/ruby-advisory-db/gems/flavour_saver/OSVDB-110796.yml +14 -0
  110. data/data/ruby-advisory-db/gems/flukso4r/OSVDB-101577.yml +7 -0
  111. data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-110439.yml +15 -0
  112. data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-90647.yml +16 -0
  113. data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-96798.yml +9 -6
  114. data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-97854.yml +12 -0
  115. data/data/ruby-advisory-db/gems/gnms/OSVDB-108594.yml +7 -0
  116. data/data/ruby-advisory-db/gems/gollum-grit_adapter/CVE-2014-9489.yml +23 -0
  117. data/data/ruby-advisory-db/gems/gollum/CVE-2015-7314.yml +13 -0
  118. data/data/ruby-advisory-db/gems/gyazo/OSVDB-108563.yml +10 -0
  119. data/data/ruby-advisory-db/gems/handlebars-source/OSVDB-131671.yml +17 -0
  120. data/data/ruby-advisory-db/gems/http/CVE-2015-1828.yml +14 -0
  121. data/data/ruby-advisory-db/gems/jquery-rails/CVE-2015-1840.yml +36 -0
  122. data/data/ruby-advisory-db/gems/jquery-ujs/CVE-2015-1840.yml +35 -0
  123. data/data/ruby-advisory-db/gems/jruby-openssl/CVE-2009-4123.yml +16 -0
  124. data/data/ruby-advisory-db/gems/jruby-sandbox/OSVDB-106279.yml +12 -0
  125. data/data/ruby-advisory-db/gems/json/OSVDB-101137.yml +17 -0
  126. data/data/ruby-advisory-db/gems/json/OSVDB-101157.yml +14 -0
  127. data/data/ruby-advisory-db/gems/json/OSVDB-90074.yml +1 -1
  128. data/data/ruby-advisory-db/gems/kafo/OSVDB-106826.yml +15 -0
  129. data/data/ruby-advisory-db/gems/kajam/OSVDB-108529.yml +12 -0
  130. data/data/ruby-advisory-db/gems/kajam/OSVDB-108530.yml +11 -0
  131. data/data/ruby-advisory-db/gems/karo/OSVDB-108573.yml +10 -0
  132. data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +0 -1
  133. data/data/ruby-advisory-db/gems/kcapifony/OSVDB-108571.yml +8 -0
  134. data/data/ruby-advisory-db/gems/kcapifony/OSVDB-108572.yml +7 -0
  135. data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +0 -1
  136. data/data/ruby-advisory-db/gems/kompanee-recipes/OSVDB-108593.yml +12 -0
  137. data/data/ruby-advisory-db/gems/lawn-login/OSVDB-108576.yml +8 -0
  138. data/data/ruby-advisory-db/gems/ldap_fluff/OSVDB-90579.yml +15 -0
  139. data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +0 -1
  140. data/data/ruby-advisory-db/gems/lean-ruport/OSVDB-108581.yml +8 -0
  141. data/data/ruby-advisory-db/gems/lingq/OSVDB-108585.yml +7 -0
  142. data/data/ruby-advisory-db/gems/lynx/OSVDB-108579.yml +7 -0
  143. data/data/ruby-advisory-db/gems/lynx/OSVDB-108580.yml +8 -0
  144. data/data/ruby-advisory-db/gems/mail/OSVDB-131677.yml +19 -0
  145. data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml +21 -0
  146. data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-132871.yml +22 -0
  147. data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +0 -1
  148. data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +5 -5
  149. data/data/ruby-advisory-db/gems/moped/CVE-2015-4410.yml +17 -0
  150. data/data/ruby-advisory-db/gems/mustache-js-rails/OSVDB-131671.yml +17 -0
  151. data/data/ruby-advisory-db/gems/net-ldap/OSVDB-106108.yml +14 -0
  152. data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-1819.yml +52 -0
  153. data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-5312.yml +92 -0
  154. data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml +37 -0
  155. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101179.yml +11 -5
  156. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-118481.yml +15 -0
  157. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-90946.yml +15 -0
  158. data/data/ruby-advisory-db/gems/open-uri-cached/OSVDB-121701.yml +13 -0
  159. data/data/ruby-advisory-db/gems/paperclip/CVE-2015-2963.yml +16 -0
  160. data/data/ruby-advisory-db/gems/paratrooper-newrelic/OSVDB-101839.yml +6 -5
  161. data/data/ruby-advisory-db/gems/paratrooper-pingdom/OSVDB-101847.yml +6 -6
  162. data/data/ruby-advisory-db/gems/passenger/CVE-2014-1831.yml +13 -0
  163. data/data/ruby-advisory-db/gems/passenger/CVE-2014-1832.yml +13 -0
  164. data/data/ruby-advisory-db/gems/passenger/CVE-2015-7519.yml +17 -0
  165. data/data/ruby-advisory-db/gems/passenger/OSVDB-90738.yml +16 -0
  166. data/data/ruby-advisory-db/gems/passenger/OSVDB-93752.yml +15 -0
  167. data/data/ruby-advisory-db/gems/passenger/OSVDB-94074.yml +14 -0
  168. data/data/ruby-advisory-db/gems/point-cli/OSVDB-108577.yml +8 -0
  169. data/data/ruby-advisory-db/gems/quick_magick/OSVDB-106954.yml +7 -0
  170. data/data/ruby-advisory-db/gems/rack-attack/OSVDB-132234.yml +26 -0
  171. data/data/ruby-advisory-db/gems/rack-ssl/OSVDB-104734.yml +11 -0
  172. data/data/ruby-advisory-db/gems/rack/CVE-2015-3225.yml +18 -0
  173. data/data/ruby-advisory-db/gems/rack/OSVDB-78121.yml +21 -0
  174. data/data/ruby-advisory-db/gems/rack/OSVDB-89317.yml +21 -0
  175. data/data/ruby-advisory-db/gems/rack/OSVDB-89320.yml +19 -0
  176. data/data/ruby-advisory-db/gems/rack/OSVDB-89327.yml +20 -0
  177. data/data/ruby-advisory-db/gems/rack/OSVDB-89938.yml +18 -0
  178. data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +9 -9
  179. data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7578.yml +47 -0
  180. data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7579.yml +75 -0
  181. data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7580.yml +70 -0
  182. data/data/ruby-advisory-db/gems/rbovirt/OSVDB-104080.yml +1 -1
  183. data/data/ruby-advisory-db/gems/redcarpet/CVE-2015-5147.yml +17 -0
  184. data/data/ruby-advisory-db/gems/redcarpet/OSVDB-120415.yml +16 -0
  185. data/data/ruby-advisory-db/gems/redis-namespace/OSVDB-96425.yml +4 -5
  186. data/data/ruby-advisory-db/gems/refile/OSVDB-120857.yml +16 -0
  187. data/data/ruby-advisory-db/gems/rest-client/CVE-2015-1820.yml +23 -0
  188. data/data/ruby-advisory-db/gems/rest-client/OSVDB-117461.yml +13 -0
  189. data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +9 -8
  190. data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-117903.yml +13 -0
  191. data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124383.yml +11 -0
  192. data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124991.yml +13 -0
  193. data/data/ruby-advisory-db/gems/screen_capture/OSVDB-107783.yml +7 -0
  194. data/data/ruby-advisory-db/gems/sentry-raven/OSVDB-115654.yml +14 -0
  195. data/data/ruby-advisory-db/gems/sfpagent/OSVDB-105971.yml +9 -7
  196. data/data/ruby-advisory-db/gems/show_in_browser/OSVDB-93490.yml +8 -0
  197. data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126329.yml +12 -0
  198. data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126330.yml +10 -0
  199. data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126331.yml +14 -0
  200. data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125675.yml +9 -0
  201. data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125676.yml +14 -0
  202. data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125678.yml +9 -0
  203. data/data/ruby-advisory-db/gems/sounder/OSVDB-96278.yml +5 -4
  204. data/data/ruby-advisory-db/gems/spree/OSVDB-119205.yml +18 -0
  205. data/data/ruby-advisory-db/gems/spree/OSVDB-125699.yml +18 -0
  206. data/data/ruby-advisory-db/gems/spree/OSVDB-125701.yml +17 -0
  207. data/data/ruby-advisory-db/gems/spree/OSVDB-125712.yml +16 -0
  208. data/data/ruby-advisory-db/gems/spree/OSVDB-125713.yml +15 -0
  209. data/data/ruby-advisory-db/gems/spree/OSVDB-69098.yml +19 -0
  210. data/data/ruby-advisory-db/gems/spree/OSVDB-73751.yml +11 -0
  211. data/data/ruby-advisory-db/gems/spree/OSVDB-76011.yml +15 -0
  212. data/data/ruby-advisory-db/gems/spree/OSVDB-81505.yml +14 -0
  213. data/data/ruby-advisory-db/gems/spree/OSVDB-81506.yml +16 -0
  214. data/data/ruby-advisory-db/gems/spree/OSVDB-90865.yml +20 -0
  215. data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +9 -3
  216. data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +9 -3
  217. data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +9 -3
  218. data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +9 -3
  219. data/data/ruby-advisory-db/gems/spree_auth/OSVDB-90865.yml +16 -0
  220. data/data/ruby-advisory-db/gems/spree_auth_devise/OSVDB-90865.yml +20 -0
  221. data/data/ruby-advisory-db/gems/sprockets/CVE-2014-7819.yml +27 -0
  222. data/data/ruby-advisory-db/gems/sprout/OSVDB-100598.yml +7 -5
  223. data/data/ruby-advisory-db/gems/sup/CVE-2013-4478.yml +14 -0
  224. data/data/ruby-advisory-db/gems/sup/CVE-2013-4479.yml +14 -0
  225. data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +0 -1
  226. data/data/ruby-advisory-db/gems/twitter-bootstrap-rails/OSVDB-109206.yml +22 -0
  227. data/data/ruby-advisory-db/gems/uglifier/OSVDB-126747.yml +19 -0
  228. data/data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml +22 -0
  229. data/data/ruby-advisory-db/gems/web-console/OSVDB-112346.yml +12 -0
  230. data/data/ruby-advisory-db/gems/webbynode/OSVDB-100920.yml +4 -3
  231. data/data/ruby-advisory-db/gems/wicked/OSVDB-98270.yml +2 -2
  232. data/data/ruby-advisory-db/gems/xaviershay-dm-rails/OSVDB-118579.yml +13 -0
  233. data/data/ruby-advisory-db/lib/cf_scrape.py +5 -0
  234. data/data/ruby-advisory-db/lib/{scrape.rb → osvdb_scrape.rb} +16 -11
  235. data/data/ruby-advisory-db/libraries/rubygems/CVE-2013-4287.yml +19 -0
  236. data/data/ruby-advisory-db/libraries/rubygems/CVE-2013-4363.yml +20 -0
  237. data/data/ruby-advisory-db/libraries/rubygems/CVE-2015-3900.yml +19 -0
  238. data/data/ruby-advisory-db/libraries/rubygems/CVE-2015-4020.yml +19 -0
  239. data/data/ruby-advisory-db/libraries/rubygems/OSVDB-33561.yml +17 -0
  240. data/data/ruby-advisory-db/libraries/rubygems/OSVDB-81444.yml +14 -0
  241. data/data/ruby-advisory-db/libraries/rubygems/OSVDB-85809.yml +16 -0
  242. data/data/ruby-advisory-db/rubies/jruby/CVE-2010-1330.yml +17 -0
  243. data/data/ruby-advisory-db/rubies/jruby/CVE-2011-4838.yml +15 -0
  244. data/data/ruby-advisory-db/rubies/jruby/CVE-2012-5370.yml +17 -0
  245. data/data/ruby-advisory-db/rubies/jruby/OSVDB-94644.yml +12 -0
  246. data/data/ruby-advisory-db/rubies/rbx/OSVDB-78119.yml +13 -0
  247. data/data/ruby-advisory-db/rubies/rbx/OSVDB-87861.yml +17 -0
  248. data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5162.yml +16 -0
  249. data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5770.yml +17 -0
  250. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1447.yml +15 -0
  251. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1891.yml +21 -0
  252. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2376.yml +18 -0
  253. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3443.yml +17 -0
  254. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3655.yml +18 -0
  255. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3656.yml +19 -0
  256. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3657.yml +16 -0
  257. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3905.yml +17 -0
  258. data/data/ruby-advisory-db/rubies/ruby/CVE-2009-0642.yml +17 -0
  259. data/data/ruby-advisory-db/rubies/ruby/CVE-2009-5147.yml +13 -0
  260. data/data/ruby-advisory-db/rubies/ruby/CVE-2011-0188.yml +17 -0
  261. data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml +17 -0
  262. data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2705.yml +16 -0
  263. data/data/ruby-advisory-db/rubies/ruby/CVE-2011-3009.yml +17 -0
  264. data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4464.yml +17 -0
  265. data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4466.yml +16 -0
  266. data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4481.yml +15 -0
  267. data/data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml +19 -0
  268. data/data/ruby-advisory-db/rubies/ruby/OSVDB-100113.yml +17 -0
  269. data/data/ruby-advisory-db/rubies/ruby/OSVDB-105027.yml +20 -0
  270. data/data/ruby-advisory-db/rubies/ruby/OSVDB-107478.yml +16 -0
  271. data/data/ruby-advisory-db/rubies/ruby/OSVDB-108971.yml +17 -0
  272. data/data/ruby-advisory-db/rubies/ruby/OSVDB-113747.yml +19 -0
  273. data/data/ruby-advisory-db/rubies/ruby/OSVDB-114641.yml +22 -0
  274. data/data/ruby-advisory-db/rubies/ruby/OSVDB-120541.yml +22 -0
  275. data/data/ruby-advisory-db/rubies/ruby/OSVDB-46550.yml +22 -0
  276. data/data/ruby-advisory-db/rubies/ruby/OSVDB-46551.yml +21 -0
  277. data/data/ruby-advisory-db/rubies/ruby/OSVDB-46552.yml +21 -0
  278. data/data/ruby-advisory-db/rubies/ruby/OSVDB-46553.yml +22 -0
  279. data/data/ruby-advisory-db/rubies/ruby/OSVDB-46554.yml +18 -0
  280. data/data/ruby-advisory-db/rubies/ruby/OSVDB-47753.yml +16 -0
  281. data/data/ruby-advisory-db/rubies/ruby/OSVDB-55031.yml +17 -0
  282. data/data/ruby-advisory-db/rubies/ruby/OSVDB-60880.yml +17 -0
  283. data/data/ruby-advisory-db/rubies/ruby/OSVDB-61774.yml +20 -0
  284. data/data/ruby-advisory-db/rubies/ruby/OSVDB-65556.yml +17 -0
  285. data/data/ruby-advisory-db/rubies/ruby/OSVDB-66040.yml +17 -0
  286. data/data/ruby-advisory-db/rubies/ruby/OSVDB-70957.yml +15 -0
  287. data/data/ruby-advisory-db/rubies/ruby/OSVDB-70958.yml +20 -0
  288. data/data/ruby-advisory-db/rubies/ruby/OSVDB-74829.yml +18 -0
  289. data/data/ruby-advisory-db/rubies/ruby/OSVDB-78118.yml +14 -0
  290. data/data/ruby-advisory-db/rubies/ruby/OSVDB-87280.yml +17 -0
  291. data/data/ruby-advisory-db/rubies/ruby/OSVDB-87863.yml +18 -0
  292. data/data/ruby-advisory-db/rubies/ruby/OSVDB-87917.yml +16 -0
  293. data/data/ruby-advisory-db/rubies/ruby/OSVDB-90587.yml +16 -0
  294. data/data/ruby-advisory-db/rubies/ruby/OSVDB-93414.yml +19 -0
  295. data/data/ruby-advisory-db/rubies/ruby/OSVDB-94628.yml +21 -0
  296. data/data/ruby-advisory-db/scripts/post-advisories.sh +18 -0
  297. data/data/ruby-advisory-db/spec/advisory_example.rb +59 -37
  298. data/data/ruby-advisory-db/spec/gem_example.rb +22 -0
  299. data/data/ruby-advisory-db/spec/gems_spec.rb +18 -2
  300. data/data/ruby-advisory-db/spec/library_example.rb +21 -0
  301. data/data/ruby-advisory-db/spec/ruby_example.rb +23 -0
  302. data/lib/bundler/audit.rb +1 -1
  303. data/lib/bundler/audit/advisory.rb +21 -1
  304. data/lib/bundler/audit/cli.rb +14 -2
  305. data/lib/bundler/audit/database.rb +7 -4
  306. data/lib/bundler/audit/scanner.rb +24 -9
  307. data/lib/bundler/audit/task.rb +31 -0
  308. data/lib/bundler/audit/version.rb +2 -2
  309. data/spec/advisory_spec.rb +68 -24
  310. data/spec/cli_spec.rb +44 -0
  311. data/spec/integration_spec.rb +22 -0
  312. data/spec/spec_helper.rb +1 -0
  313. metadata +246 -4
@@ -0,0 +1,55 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2015-7581
5
+ date: 2016-01-25
6
+ url: "https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE"
7
+
8
+ title: Object leak vulnerability for wildcard controller routes in Action Pack
9
+
10
+ description: |
11
+ There is an object leak vulnerability for wildcard controllers in Action Pack.
12
+ This vulnerability has been assigned the CVE identifier CVE-2015-7581.
13
+
14
+ Versions Affected: >= 4.0.0 and < 5.0.0.beta1
15
+ Not affected: < 4.0.0, 5.0.0.beta1 and newer
16
+ Fixed Versions: 4.2.5.1, 4.1.14.1
17
+
18
+ Impact
19
+ ------
20
+ Users that have a route that contains the string ":controller" are susceptible
21
+ to objects being leaked globally which can lead to unbounded memory growth.
22
+ To identify if your application is vulnerable, look for routes that contain
23
+ ":controller".
24
+
25
+ Internally, Action Pack keeps a map of "url controller name" to "controller
26
+ class name". This map is cached globally, and is populated even if the
27
+ controller class doesn't actually exist.
28
+
29
+ All users running an affected release should either upgrade or use one of the
30
+ workarounds immediately.
31
+
32
+ Releases
33
+ --------
34
+ The FIXED releases are available at the normal locations.
35
+
36
+ Workarounds
37
+ -----------
38
+ There are no feasible workarounds for this issue.
39
+
40
+ Patches
41
+ -------
42
+ To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
43
+
44
+ * 4-1-wildcard_route.patch - Patch for 4.1 series
45
+ * 4-2-wildcard_route.patch - Patch for 4.2 series
46
+
47
+ Please note that only the 4.1.x and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
48
+
49
+ unaffected_versions:
50
+ - "< 4.0.0"
51
+ - ">= 5.0.0.beta1"
52
+
53
+ patched_versions:
54
+ - "~> 4.2.5.1"
55
+ - "~> 4.1.14.1"
@@ -0,0 +1,71 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2016-0751
5
+ date: 2016-01-25
6
+ url: "https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc"
7
+
8
+ title: Possible Object Leak and Denial of Service attack in Action Pack
9
+
10
+ description: |
11
+ There is a possible object leak which can lead to a denial of service
12
+ vulnerability in Action Pack. This vulnerability has been
13
+ assigned the CVE identifier CVE-2016-0751.
14
+
15
+ Versions Affected: All.
16
+ Not affected: None.
17
+ Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
18
+
19
+ Impact
20
+ ------
21
+ A carefully crafted accept header can cause a global cache of mime types to
22
+ grow indefinitely which can lead to a possible denial of service attack in
23
+ Action Pack.
24
+
25
+ All users running an affected release should either upgrade or use one of the
26
+ workarounds immediately.
27
+
28
+ Releases
29
+ --------
30
+ The FIXED releases are available at the normal locations.
31
+
32
+ Workarounds
33
+ -----------
34
+ This attack can be mitigated by a proxy that only allows known mime types in
35
+ the Accept header.
36
+
37
+ Placing the following code in an initializer will also mitigate the issue:
38
+
39
+ ```ruby
40
+ require 'action_dispatch/http/mime_type'
41
+
42
+ Mime.const_set :LOOKUP, Hash.new { |h,k|
43
+ Mime::Type.new(k) unless k.blank?
44
+ }
45
+ ```
46
+
47
+ Patches
48
+ -------
49
+ To aid users who aren't able to upgrade immediately we have provided patches for
50
+ the two supported release series. They are in git-am format and consist of a
51
+ single changeset.
52
+
53
+ * 5-0-mime_types_leak.patch - Patch for 5.0 series
54
+ * 4-2-mime_types_leak.patch - Patch for 4.2 series
55
+ * 4-1-mime_types_leak.patch - Patch for 4.1 series
56
+ * 3-2-mime_types_leak.patch - Patch for 3.2 series
57
+
58
+ Please note that only the 4.1.x and 4.2.x series are supported at present. Users
59
+ of earlier unsupported releases are advised to upgrade as soon as possible as we
60
+ cannot guarantee the continued availability of security fixes for unsupported
61
+ releases.
62
+
63
+ Credits
64
+ -------
65
+ Aaron Patterson <3<3
66
+
67
+ patched_versions:
68
+ - "~> 5.0.0.beta1.1"
69
+ - "~> 4.2.5.1"
70
+ - "~> 4.1.14.1"
71
+ - "~> 3.2.22.1"
@@ -13,7 +13,7 @@ description: |
13
13
  of the parameters to the helper (unit) is not escaped correctly. Applications
14
14
  which pass user controlled data as the unit parameter are vulnerable to an XSS attack.
15
15
 
16
- cvss_v2:
16
+ cvss_v2: 4.3
17
17
 
18
18
  patched_versions:
19
19
  - ~> 3.2.16
@@ -8,10 +8,10 @@ title: Denial of Service Vulnerability in Action View
8
8
  date: 2013-12-03
9
9
 
10
10
  description: |
11
- There is a denial of service vulnerability in the header handling component of
11
+ There is a denial of service vulnerability in the header handling component of
12
12
  Action View.
13
13
 
14
- cvss_v2:
14
+ cvss_v2: 5.0
15
15
 
16
16
  unaffected_versions:
17
17
  - ~> 2.3.0
@@ -9,14 +9,14 @@ date: 2013-12-03
9
9
 
10
10
  description: |
11
11
  There is a vulnerability in the simple_format helper in Ruby on Rails.
12
- The simple_format helper converts user supplied text into html text
13
- which is intended to be safe for display. A change made to the
14
- implementation of this helper means that any user provided HTML
15
- attributes will not be escaped correctly. As a result of this error,
16
- applications which pass user-controlled data to be included as html
12
+ The simple_format helper converts user supplied text into html text
13
+ which is intended to be safe for display. A change made to the
14
+ implementation of this helper means that any user provided HTML
15
+ attributes will not be escaped correctly. As a result of this error,
16
+ applications which pass user-controlled data to be included as html
17
17
  attributes will be vulnerable to an XSS attack.
18
18
 
19
- cvss_v2:
19
+ cvss_v2: 4.3
20
20
 
21
21
  unaffected_versions:
22
22
  - ~> 2.3.0
@@ -15,9 +15,9 @@ description: |
15
15
  parameters insecurely and store them in the same key that Rails uses
16
16
  for its own parameters. In the event that happens the application
17
17
  will receive unsafe parameters and could be vulnerable to the earlier
18
- vulnerability.
18
+ vulnerability.
19
19
 
20
- cvss_v2:
20
+ cvss_v2: 6.4
21
21
 
22
22
  patched_versions:
23
23
  - ~> 3.2.16
@@ -11,11 +11,11 @@ description: |
11
11
  There is a vulnerability in the internationalization component of Ruby on
12
12
  Rails. Under certain common configurations an attacker can provide specially
13
13
  crafted input which will execute a reflective XSS attack.
14
-
14
+
15
15
  The root cause of this issue is a vulnerability in the i18n gem which has
16
16
  been assigned the identifier CVE-2013-4492.
17
17
 
18
- cvss_v2:
18
+ cvss_v2: 4.3
19
19
 
20
20
  patched_versions:
21
21
  - ~> 3.2.16
@@ -16,7 +16,7 @@ description: |
16
16
  script code in a user's browser session within the trust relationship between
17
17
  their browser and the server.
18
18
 
19
- cvss_v2:
19
+ cvss_v2: 4.3
20
20
 
21
21
  patched_versions:
22
22
  - ~> 3.2.17
@@ -13,7 +13,7 @@ description: |
13
13
  handling MIME types that are converted to symbols. This may allow a
14
14
  remote attacker to cause a denial of service.
15
15
 
16
- cvss_v2:
16
+ cvss_v2: 5.0
17
17
 
18
18
  unaffected_versions:
19
19
  - ~> 4.0.0
@@ -0,0 +1,18 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2011-3186
5
+ osvdb: 74616
6
+ url: https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g
7
+ title: Response Splitting Vulnerability in Ruby on Rails
8
+ date: 2011-08-16
9
+
10
+ description: |
11
+ A response splitting flaw in Ruby on Rails 2.3.x was reported that could allow
12
+ a remote attacker to inject arbitrary HTTP headers into a response due to
13
+ insufficient sanitization of the values provided for response content types.
14
+
15
+ cvss_v2: 4.3
16
+
17
+ patched_versions:
18
+ - ">= 2.3.13"
@@ -0,0 +1,23 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2011-4319
5
+ osvdb: 77199
6
+ url: https://groups.google.com/forum/#!topic/rubyonrails-security/K2HXD7c8fMU
7
+ title: XSS vulnerability in the translate helper method in Ruby on Rails
8
+ date: 2011-11-17
9
+
10
+ description: |
11
+ A cross-site scripting (XSS) flaw was found in the way the 'translate' helper
12
+ method of the Ruby on Rails performed HTML escaping of interpolated user
13
+ input, when interpolation in combination with HTML-safe translations were
14
+ used. A remote attacker could use this flaw to execute arbitrary HTML or web
15
+ script by providing a specially-crafted input to Ruby on Rails application,
16
+ using the ActionPack module and its 'translate' helper method without explicit
17
+ (application specific) sanitization of user provided input.
18
+
19
+ cvss_v2: 4.3
20
+
21
+ patched_versions:
22
+ - "~> 3.0.11"
23
+ - ">= 3.1.2"
@@ -1,10 +1,10 @@
1
- ---
1
+ ---
2
2
  gem: actionpack
3
3
  framework: rails
4
4
  cve: 2012-3424
5
5
  osvdb: 84243
6
6
  url: http://www.osvdb.org/show/osvdb/84243
7
- title:
7
+ title:
8
8
  Ruby on Rails actionpack/lib/action_controller/metal/http_authentication.rb
9
9
  with_http_digest Helper Method Remote DoS
10
10
  date: 2012-07-26
@@ -16,12 +16,12 @@ description: |
16
16
  with_http_digest helper method is being used. This may allow a remote
17
17
  attacker to cause a loss of availability for the program.
18
18
 
19
- cvss_v2: 4.3
19
+ cvss_v2: 5.0
20
20
 
21
21
  unaffected_versions:
22
22
  - ">= 2.3.5, <= 2.3.14"
23
23
 
24
- patched_versions:
24
+ patched_versions:
25
25
  - ~> 3.0.16
26
26
  - ~> 3.1.7
27
27
  - ">= 3.2.7"
@@ -1,4 +1,4 @@
1
- ---
1
+ ---
2
2
  gem: actionpack
3
3
  framework: rails
4
4
  cve: 2013-1855
@@ -7,14 +7,14 @@ url: http://www.osvdb.org/show/osvdb/91452
7
7
  title: XSS vulnerability in sanitize_css in Action Pack
8
8
  date: 2013-03-19
9
9
 
10
- description: |
10
+ description: |
11
11
  There is an XSS vulnerability in the `sanitize_css` method in Action
12
12
  Pack. Carefully crafted text can bypass the sanitization provided in
13
13
  the `sanitize_css` method in Action Pack
14
14
 
15
- cvss_v2: 4.0
15
+ cvss_v2: 4.3
16
16
 
17
- patched_versions:
17
+ patched_versions:
18
18
  - ~> 2.3.18
19
19
  - ~> 3.1.12
20
20
  - ">= 3.2.13"
@@ -1,4 +1,4 @@
1
- ---
1
+ ---
2
2
  gem: actionpack
3
3
  framework: rails
4
4
  cve: 2013-1857
@@ -7,7 +7,7 @@ url: http://osvdb.org/show/osvdb/91454
7
7
  title: XSS Vulnerability in the `sanitize` helper of Ruby on Rails
8
8
  date: 2013-03-19
9
9
 
10
- description: |
10
+ description: |
11
11
  The sanitize helper in Ruby on Rails is designed to
12
12
  filter HTML and remove all tags and attributes which could be
13
13
  malicious. The code which ensured that URLs only contain supported
@@ -15,9 +15,9 @@ description: |
15
15
  embed a tag containing a URL which executes arbitrary javascript
16
16
  code.
17
17
 
18
- cvss_v2: 4.0
18
+ cvss_v2: 4.3
19
19
 
20
- patched_versions:
20
+ patched_versions:
21
21
  - ~> 2.3.18
22
22
  - ~> 3.1.12
23
23
  - ">= 3.2.13"
@@ -0,0 +1,92 @@
1
+ ---
2
+ gem: actionview
3
+ framework: rails
4
+ cve: 2016-0752
5
+ date: 2016-01-25
6
+ url: "https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00"
7
+
8
+ title: Possible Information Leak Vulnerability in Action View
9
+ description: |
10
+ There is a possible directory traversal and information leak vulnerability in
11
+ Action View. This vulnerability has been assigned the CVE identifier
12
+ CVE-2016-0752.
13
+
14
+ Versions Affected: All.
15
+ Not affected: None.
16
+ Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
17
+
18
+ Impact
19
+ ------
20
+ Applications that pass unverified user input to the `render` method in a
21
+ controller may be vulnerable to an information leak vulnerability.
22
+
23
+ Impacted code will look something like this:
24
+
25
+ ```ruby
26
+ def index
27
+ render params[:id]
28
+ end
29
+ ```
30
+
31
+ Carefully crafted requests can cause the above code to render files from
32
+ unexpected places like outside the application's view directory, and can
33
+ possibly escalate this to a remote code execution attack.
34
+
35
+ All users running an affected release should either upgrade or use one of the
36
+ workarounds immediately.
37
+
38
+ Releases
39
+ --------
40
+ The FIXED releases are available at the normal locations.
41
+
42
+ Workarounds
43
+ -----------
44
+ A workaround to this issue is to not pass arbitrary user input to the `render`
45
+ method. Instead, verify that data before passing it to the `render` method.
46
+
47
+ For example, change this:
48
+
49
+ ```ruby
50
+ def index
51
+ render params[:id]
52
+ end
53
+ ```
54
+
55
+ To this:
56
+
57
+ ```ruby
58
+ def index
59
+ render verify_template(params[:id])
60
+ end
61
+
62
+ private
63
+ def verify_template(name)
64
+ # add verification logic particular to your application here
65
+ end
66
+ ```
67
+
68
+ Patches
69
+ -------
70
+ To aid users who aren't able to upgrade immediately we have provided patches for
71
+ the two supported release series. They are in git-am format and consist of a
72
+ single changeset.
73
+
74
+ * 3-2-render_data_leak.patch - Patch for 3.2 series
75
+ * 4-1-render_data_leak.patch - Patch for 4.1 series
76
+ * 4-2-render_data_leak.patch - Patch for 4.2 series
77
+ * 5-0-render_data_leak.patch - Patch for 5.0 series
78
+
79
+ Please note that only the 4.1.x and 4.2.x series are supported at present. Users
80
+ of earlier unsupported releases are advised to upgrade as soon as possible as we
81
+ cannot guarantee the continued availability of security fixes for unsupported
82
+ releases.
83
+
84
+ Credits
85
+ -------
86
+ Thanks John Poulin for reporting this!
87
+
88
+ patched_versions:
89
+ - "~> 5.0.0.beta1.1"
90
+ - "~> 4.2.5.1"
91
+ - "~> 4.1.14.1"
92
+ - "~> 3.2.22.1"
@@ -0,0 +1,92 @@
1
+ ---
2
+ gem: activemodel
3
+ framework: rails
4
+ cve: 2016-0753
5
+ date: 2016-01-25
6
+ url: "https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ"
7
+
8
+ title: Possible Input Validation Circumvention in Active Model
9
+
10
+ description: |
11
+ There is a possible input validation circumvention vulnerability in Active
12
+ Model. This vulnerability has been assigned the CVE identifier CVE-2016-0753.
13
+
14
+ Versions Affected: 4.1.0 and newer
15
+ Not affected: 4.0.13 and older
16
+ Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1
17
+
18
+ Impact
19
+ ------
20
+ Code that uses Active Model based models (including Active Record models) and
21
+ does not validate user input before passing it to the model can be subject to
22
+ an attack where specially crafted input will cause the model to skip
23
+ validations.
24
+
25
+ Vulnerable code will look something like this:
26
+
27
+ ```ruby
28
+ SomeModel.new(unverified_user_input)
29
+ ```
30
+
31
+ Rails users using Strong Parameters are generally not impacted by this issue
32
+ as they are encouraged to whitelist parameters and must specifically opt-out
33
+ of input verification using the `permit!` method to allow mass assignment.
34
+
35
+ For example, a vulnerable Rails application will have code that looks like
36
+ this:
37
+
38
+ ```ruby
39
+ def create
40
+ params.permit! # allow all parameters
41
+ @user = User.new params[:users]
42
+ end
43
+ ```
44
+
45
+ Active Model and Active Record objects are not equipped to handle arbitrary
46
+ user input. It is up to the application to verify input before passing it to
47
+ Active Model models. Rails users already have Strong Parameters in place to
48
+ handle white listing, but applications using Active Model and Active Record
49
+ outside of a Rails environment may be impacted.
50
+
51
+ All users running an affected release should either upgrade or use one of the
52
+ workarounds immediately.
53
+
54
+ Releases
55
+ --------
56
+ The FIXED releases are available at the normal locations.
57
+
58
+ Workarounds
59
+ -----------
60
+ There are several workarounds depending on the application. Inside a Rails
61
+ application, stop using `permit!`. Outside a Rails application, either use
62
+ Hash#slice to select the parameters you need, or integrate Strong Parameters
63
+ with your application.
64
+
65
+ Patches
66
+ -------
67
+ To aid users who aren't able to upgrade immediately we have provided patches for
68
+ the two supported release series. They are in git-am format and consist of a
69
+ single changeset.
70
+
71
+ * 4-1-validation_skip.patch - Patch for 4.1 series
72
+ * 4-2-validation_skip.patch - Patch for 4.2 series
73
+ * 5-0-validation_skip.patch - Patch for 5.0 series
74
+
75
+ Please note that only the 4.1.x and 4.2.x series are supported at present. Users
76
+ of earlier unsupported releases are advised to upgrade as soon as possible as we
77
+ cannot guarantee the continued availability of security fixes for unsupported
78
+ releases.
79
+
80
+ Credits
81
+ -------
82
+ Thanks to:
83
+
84
+ [John Backus](https://github.com/backus) from BlockScore for reporting this!
85
+
86
+ unaffected_versions:
87
+ - "<= 4.0.13"
88
+
89
+ patched_versions:
90
+ - "~> 5.0.0.beta1.1"
91
+ - "~> 4.2.5.1"
92
+ - "~> 4.1.14.1"