bundler-audit 0.5.0 → 0.6.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (60) hide show
  1. checksums.yaml +4 -4
  2. data/.travis.yml +11 -6
  3. data/ChangeLog.md +7 -1
  4. data/Gemfile +1 -1
  5. data/README.md +13 -7
  6. data/bin/bundler-audit +3 -0
  7. data/data/ruby-advisory-db.ts +1 -1
  8. data/data/ruby-advisory-db/.gitignore +0 -1
  9. data/data/ruby-advisory-db/.travis.yml +0 -6
  10. data/data/ruby-advisory-db/CONTRIBUTING.md +34 -21
  11. data/data/ruby-advisory-db/CONTRIBUTORS.md +2 -0
  12. data/data/ruby-advisory-db/Gemfile +1 -1
  13. data/data/ruby-advisory-db/README.md +38 -21
  14. data/data/ruby-advisory-db/gems/RedCloth/{OSVDB-115941.yml → CVE-2012-6684.yml} +6 -1
  15. data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7576.yml +102 -102
  16. data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7581.yml +2 -2
  17. data/data/ruby-advisory-db/gems/actionpack/CVE-2016-0751.yml +45 -45
  18. data/data/ruby-advisory-db/gems/actionpack/CVE-2016-0752.yml +96 -0
  19. data/data/ruby-advisory-db/gems/actionpack/CVE-2016-2097.yml +90 -0
  20. data/data/ruby-advisory-db/gems/actionpack/CVE-2016-2098.yml +89 -0
  21. data/data/ruby-advisory-db/gems/actionpack/CVE-2016-6316.yml +57 -0
  22. data/data/ruby-advisory-db/gems/actionview/CVE-2016-0752.yml +80 -80
  23. data/data/ruby-advisory-db/gems/actionview/CVE-2016-2097.yml +89 -0
  24. data/data/ruby-advisory-db/gems/actionview/CVE-2016-6316.yml +56 -0
  25. data/data/ruby-advisory-db/gems/activemodel/CVE-2016-0753.yml +78 -78
  26. data/data/ruby-advisory-db/gems/activerecord/CVE-2015-7577.yml +91 -91
  27. data/data/ruby-advisory-db/gems/activerecord/CVE-2016-6317.yml +73 -0
  28. data/data/ruby-advisory-db/gems/administrate/CVE-2016-3098.yml +14 -0
  29. data/data/ruby-advisory-db/gems/aescrypt/CVE-2013-7463.yml +10 -0
  30. data/data/ruby-advisory-db/gems/archive-tar-minitar/CVE-2016-10173.yml +16 -0
  31. data/data/ruby-advisory-db/gems/colorscore/CVE-2015-7541.yml +2 -1
  32. data/data/ruby-advisory-db/gems/doorkeeper/CVE-2016-6582.yml +43 -0
  33. data/data/ruby-advisory-db/gems/espeak-ruby/CVE-2016-10193.yml +15 -0
  34. data/data/ruby-advisory-db/gems/festivaltts4r/CVE-2016-10194.yml +12 -0
  35. data/data/ruby-advisory-db/gems/git-fastclone/CVE-2015-8968.yml +21 -0
  36. data/data/ruby-advisory-db/gems/git-fastclone/CVE-2015-8969.yml +13 -0
  37. data/data/ruby-advisory-db/gems/mail/OSVDB-131677.yml +18 -11
  38. data/data/ruby-advisory-db/gems/minitar/CVE-2016-10173.yml +16 -0
  39. data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-8806.yml +42 -0
  40. data/data/ruby-advisory-db/gems/nokogiri/CVE-2016-4658.yml +32 -0
  41. data/data/ruby-advisory-db/gems/nokogiri/CVE-2017-5029.yml +44 -0
  42. data/data/ruby-advisory-db/gems/passenger/CVE-2016-10345.yml +16 -0
  43. data/data/ruby-advisory-db/gems/rack-mini-profiler/CVE-2016-4442.yml +17 -0
  44. data/data/ruby-advisory-db/gems/ruby-saml/CVE-2016-5697.yml +17 -0
  45. data/data/ruby-advisory-db/gems/rubyzip/CVE-2017-5946.yml +14 -0
  46. data/data/ruby-advisory-db/gems/safemode/CVE-2016-3693.yml +13 -0
  47. data/data/ruby-advisory-db/gems/spina/CVE-2015-4619.yml +16 -0
  48. data/data/ruby-advisory-db/gems/twitter-bootstrap-rails/OSVDB-109206.yml +1 -1
  49. data/data/ruby-advisory-db/rubies/ruby/CVE-2015-1855.yml +17 -0
  50. data/data/ruby-advisory-db/rubies/ruby/CVE-2015-9096.yml +19 -0
  51. data/data/ruby-advisory-db/spec/advisory_example.rb +19 -4
  52. data/gemspec.yml +1 -1
  53. data/lib/bundler/audit/cli.rb +10 -5
  54. data/lib/bundler/audit/database.rb +13 -3
  55. data/lib/bundler/audit/version.rb +1 -1
  56. data/spec/bundle/secure/Gemfile +1 -1
  57. data/spec/cli_spec.rb +80 -25
  58. data/spec/database_spec.rb +5 -5
  59. data/spec/integration_spec.rb +2 -2
  60. metadata +35 -5
@@ -51,5 +51,5 @@ unaffected_versions:
51
51
  - ">= 5.0.0.beta1"
52
52
 
53
53
  patched_versions:
54
- - "~> 4.2.5.1"
55
- - "~> 4.1.14.1"
54
+ - "~> 4.2.5, >= 4.2.5.1"
55
+ - "~> 4.1.14, >= 4.1.14.1"
@@ -8,64 +8,64 @@ url: "https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc"
8
8
  title: Possible Object Leak and Denial of Service attack in Action Pack
9
9
 
10
10
  description: |
11
- There is a possible object leak which can lead to a denial of service
12
- vulnerability in Action Pack. This vulnerability has been
13
- assigned the CVE identifier CVE-2016-0751.
11
+ There is a possible object leak which can lead to a denial of service
12
+ vulnerability in Action Pack. This vulnerability has been
13
+ assigned the CVE identifier CVE-2016-0751.
14
14
 
15
- Versions Affected: All.
16
- Not affected: None.
17
- Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
15
+ Versions Affected: All.
16
+ Not affected: None.
17
+ Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
18
18
 
19
- Impact
20
- ------
21
- A carefully crafted accept header can cause a global cache of mime types to
22
- grow indefinitely which can lead to a possible denial of service attack in
23
- Action Pack.
19
+ Impact
20
+ ------
21
+ A carefully crafted accept header can cause a global cache of mime types to
22
+ grow indefinitely which can lead to a possible denial of service attack in
23
+ Action Pack.
24
24
 
25
- All users running an affected release should either upgrade or use one of the
26
- workarounds immediately.
25
+ All users running an affected release should either upgrade or use one of the
26
+ workarounds immediately.
27
27
 
28
- Releases
29
- --------
30
- The FIXED releases are available at the normal locations.
28
+ Releases
29
+ --------
30
+ The FIXED releases are available at the normal locations.
31
31
 
32
- Workarounds
33
- -----------
34
- This attack can be mitigated by a proxy that only allows known mime types in
35
- the Accept header.
32
+ Workarounds
33
+ -----------
34
+ This attack can be mitigated by a proxy that only allows known mime types in
35
+ the Accept header.
36
36
 
37
- Placing the following code in an initializer will also mitigate the issue:
37
+ Placing the following code in an initializer will also mitigate the issue:
38
38
 
39
- ```ruby
40
- require 'action_dispatch/http/mime_type'
39
+ ```ruby
40
+ require 'action_dispatch/http/mime_type'
41
41
 
42
- Mime.const_set :LOOKUP, Hash.new { |h,k|
43
- Mime::Type.new(k) unless k.blank?
44
- }
45
- ```
42
+ Mime.const_set :LOOKUP, Hash.new { |h,k|
43
+ Mime::Type.new(k) unless k.blank?
44
+ }
45
+ ```
46
46
 
47
- Patches
48
- -------
49
- To aid users who aren't able to upgrade immediately we have provided patches for
50
- the two supported release series. They are in git-am format and consist of a
51
- single changeset.
47
+ Patches
48
+ -------
49
+ To aid users who aren't able to upgrade immediately we have provided patches for
50
+ the two supported release series. They are in git-am format and consist of a
51
+ single changeset.
52
52
 
53
- * 5-0-mime_types_leak.patch - Patch for 5.0 series
54
- * 4-2-mime_types_leak.patch - Patch for 4.2 series
55
- * 4-1-mime_types_leak.patch - Patch for 4.1 series
56
- * 3-2-mime_types_leak.patch - Patch for 3.2 series
53
+ * 5-0-mime_types_leak.patch - Patch for 5.0 series
54
+ * 4-2-mime_types_leak.patch - Patch for 4.2 series
55
+ * 4-1-mime_types_leak.patch - Patch for 4.1 series
56
+ * 3-2-mime_types_leak.patch - Patch for 3.2 series
57
57
 
58
- Please note that only the 4.1.x and 4.2.x series are supported at present. Users
59
- of earlier unsupported releases are advised to upgrade as soon as possible as we
60
- cannot guarantee the continued availability of security fixes for unsupported
61
- releases.
58
+ Please note that only the 4.1.x and 4.2.x series are supported at present. Users
59
+ of earlier unsupported releases are advised to upgrade as soon as possible as we
60
+ cannot guarantee the continued availability of security fixes for unsupported
61
+ releases.
62
62
 
63
- Credits
64
- -------
63
+ Credits
64
+ -------
65
65
  Aaron Patterson <3<3
66
66
 
67
67
  patched_versions:
68
- - "~> 5.0.0.beta1.1"
69
- - "~> 4.2.5.1"
70
- - "~> 4.1.14.1"
68
+ - ">= 5.0.0.beta1.1"
69
+ - "~> 4.2.5, >= 4.2.5.1"
70
+ - "~> 4.1.14, >= 4.1.14.1"
71
71
  - "~> 3.2.22.1"
@@ -0,0 +1,96 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2016-0752
5
+ date: 2016-01-25
6
+ url: "https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00"
7
+
8
+ title: Possible Information Leak Vulnerability in Action View
9
+ description: |
10
+ There is a possible directory traversal and information leak vulnerability in
11
+ Action View. This vulnerability has been assigned the CVE identifier
12
+ CVE-2016-0752.
13
+
14
+ Versions Affected: All.
15
+ Not affected: None.
16
+ Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
17
+
18
+ Impact
19
+ ------
20
+ Applications that pass unverified user input to the `render` method in a
21
+ controller may be vulnerable to an information leak vulnerability.
22
+
23
+ Impacted code will look something like this:
24
+
25
+ ```ruby
26
+ def index
27
+ render params[:id]
28
+ end
29
+ ```
30
+
31
+ Carefully crafted requests can cause the above code to render files from
32
+ unexpected places like outside the application's view directory, and can
33
+ possibly escalate this to a remote code execution attack.
34
+
35
+ All users running an affected release should either upgrade or use one of the
36
+ workarounds immediately.
37
+
38
+ Releases
39
+ --------
40
+ The FIXED releases are available at the normal locations.
41
+
42
+ Workarounds
43
+ -----------
44
+ A workaround to this issue is to not pass arbitrary user input to the `render`
45
+ method. Instead, verify that data before passing it to the `render` method.
46
+
47
+ For example, change this:
48
+
49
+ ```ruby
50
+ def index
51
+ render params[:id]
52
+ end
53
+ ```
54
+
55
+ To this:
56
+
57
+ ```ruby
58
+ def index
59
+ render verify_template(params[:id])
60
+ end
61
+
62
+ private
63
+ def verify_template(name)
64
+ # add verification logic particular to your application here
65
+ end
66
+ ```
67
+
68
+ Patches
69
+ -------
70
+ To aid users who aren't able to upgrade immediately we have provided patches for
71
+ the two supported release series. They are in git-am format and consist of a
72
+ single changeset.
73
+
74
+ * 3-2-render_data_leak.patch - Patch for 3.2 series
75
+ * 4-1-render_data_leak.patch - Patch for 4.1 series
76
+ * 4-2-render_data_leak.patch - Patch for 4.2 series
77
+ * 5-0-render_data_leak.patch - Patch for 5.0 series
78
+
79
+ Please note that only the 4.1.x and 4.2.x series are supported at present. Users
80
+ of earlier unsupported releases are advised to upgrade as soon as possible as we
81
+ cannot guarantee the continued availability of security fixes for unsupported
82
+ releases.
83
+
84
+ Credits
85
+ -------
86
+ Thanks John Poulin for reporting this!
87
+
88
+ unaffected_versions:
89
+ # Newer versions are affected, but tracked in the actionview gem.
90
+ - ">= 4.1.0"
91
+
92
+ patched_versions:
93
+ - ">= 5.0.0.beta1.1"
94
+ - "~> 4.2.5, >= 4.2.5.1"
95
+ - "~> 4.1.14, >= 4.1.14.1"
96
+ - "~> 3.2.22.1"
@@ -0,0 +1,90 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2016-2097
5
+ date: 2016-02-29
6
+ url: "https://groups.google.com/forum/#!topic/rubyonrails-security/ddY6HgqB2z4"
7
+
8
+ title: Possible Information Leak Vulnerability in Action View
9
+
10
+ description: |
11
+
12
+ There is a possible directory traversal and information leak vulnerability
13
+ in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2
14
+ patch was not covering all the scenarios. This vulnerability has been
15
+ assigned the CVE identifier CVE-2016-2097.
16
+
17
+ Versions Affected: 3.2.x, 4.0.x, 4.1.x
18
+ Not affected: 4.2+
19
+ Fixed Versions: 3.2.22.2, 4.1.14.2
20
+
21
+ Impact
22
+ ------
23
+ Applications that pass unverified user input to the `render` method in a
24
+ controller may be vulnerable to an information leak vulnerability.
25
+
26
+ Impacted code will look something like this:
27
+
28
+ ```ruby
29
+ def index
30
+ render params[:id]
31
+ end
32
+ ```
33
+
34
+ Carefully crafted requests can cause the above code to render files from
35
+ unexpected places like outside the application's view directory, and can
36
+ possibly escalate this to a remote code execution attack.
37
+
38
+ All users running an affected release should either upgrade or use one of the
39
+ workarounds immediately.
40
+
41
+ Releases
42
+ --------
43
+ The FIXED releases are available at the normal locations.
44
+
45
+ Workarounds
46
+ -----------
47
+ A workaround to this issue is to not pass arbitrary user input to the `render`
48
+ method. Instead, verify that data before passing it to the `render` method.
49
+
50
+ For example, change this:
51
+
52
+ ```ruby
53
+ def index
54
+ render params[:id]
55
+ end
56
+ ```
57
+
58
+ To this:
59
+
60
+ ```ruby
61
+ def index
62
+ render verify_template(params[:id])
63
+ end
64
+
65
+ private
66
+ def verify_template(name)
67
+ # add verification logic particular to your application here
68
+ end
69
+ ```
70
+
71
+ Patches
72
+ -------
73
+ To aid users who aren't able to upgrade immediately we have provided patches
74
+ for it. It is in git-am format and consist of a single changeset.
75
+
76
+ * 3-2-render_data_leak_2.patch - Patch for 3.2 series
77
+ * 4-1-render_data_leak_2.patch - Patch for 4.1 series
78
+
79
+ Credits
80
+ -------
81
+ Thanks to both Jyoti Singh and Tobias Kraze from makandra for reporting this
82
+ and working with us in the patch!
83
+
84
+ unaffected_versions:
85
+ # Newer versions are affected, but tracked in the actionview gem.
86
+ - ">= 4.1.0"
87
+
88
+ patched_versions:
89
+ - "~> 3.2.22.2"
90
+ - "~> 4.1.14, >= 4.1.14.2"
@@ -0,0 +1,89 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2016-2098
5
+ date: 2016-02-29
6
+ url: "https://groups.google.com/forum/#!topic/rubyonrails-security/ly-IH-fxr_Q"
7
+
8
+ title: Possible remote code execution vulnerability in Action Pack
9
+
10
+ description: |
11
+ There is a possible remote code execution vulnerability in Action Pack.
12
+ This vulnerability has been assigned the CVE identifier CVE-2016-2098.
13
+
14
+ Versions Affected: 3.2.x, 4.0.x, 4.1.x, 4.2.x
15
+ Not affected: 5.0+
16
+ Fixed Versions: 3.2.22.2, 4.1.14.2, 4.2.5.2
17
+
18
+ Impact
19
+ ------
20
+ Applications that pass unverified user input to the `render` method in a
21
+ controller or a view may be vulnerable to a code injection.
22
+
23
+ Impacted code will look like this:
24
+
25
+ ```ruby
26
+ class TestController < ApplicationController
27
+ def show
28
+ render params[:id]
29
+ end
30
+ end
31
+ ```
32
+
33
+ An attacker could use the request parameters to coerce the above example
34
+ to execute arbitrary ruby code.
35
+
36
+ All users running an affected release should either upgrade or use one of
37
+ the workarounds immediately.
38
+
39
+ Releases
40
+ --------
41
+ The FIXED releases are available at the normal locations.
42
+
43
+ Workarounds
44
+ -----------
45
+ A workaround to this issue is to not pass arbitrary user input to the `render`
46
+ method. Instead, verify that data before passing it to the `render` method.
47
+
48
+ For example, change this:
49
+
50
+ ```ruby
51
+ def index
52
+ render params[:id]
53
+ end
54
+ ```
55
+
56
+ To this:
57
+
58
+ ```ruby
59
+ def index
60
+ render verify_template(params[:id])
61
+ end
62
+
63
+ private
64
+ def verify_template(name)
65
+ # add verification logic particular to your application here
66
+ end
67
+ ```
68
+
69
+ Patches
70
+ -------
71
+ To aid users who aren't able to upgrade immediately we have provided a
72
+ patch for it. It is in git-am format and consist of a single changeset.
73
+
74
+ * 3-2-secure_inline_with_params.patch - Patch for 3.2 series
75
+ * 4-1-secure_inline_with_params.patch - Patch for 4.1 series
76
+ * 4-2-secure_inline_with_params.patch - Patch for 4.2 series
77
+
78
+ Credits
79
+ -------
80
+ Thanks to both Tobias Kraze from makandra and joernchen of Phenoelit for
81
+ reporting this!
82
+
83
+ unaffected_versions:
84
+ - ">= 5.0.0.beta1"
85
+
86
+ patched_versions:
87
+ - "~> 3.2.22.2"
88
+ - "~> 4.2.5, >= 4.2.5.2"
89
+ - "~> 4.1.14, >= 4.1.14.2"
@@ -0,0 +1,57 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2016-6316
5
+ date: 2016-08-11
6
+ url: https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk
7
+
8
+ title: Possible XSS Vulnerability in Action View
9
+
10
+ description: |
11
+ There is a possible XSS vulnerability in Action View. Text declared as "HTML
12
+ safe" will not have quotes escaped when used as attribute values in tag
13
+ helpers.
14
+
15
+ Impact
16
+ ------
17
+
18
+ Text declared as "HTML safe" when passed as an attribute value to a tag helper
19
+ will not have quotes escaped which can lead to an XSS attack. Impacted code
20
+ looks something like this:
21
+
22
+ ```ruby
23
+ content_tag(:div, "hi", title: user_input.html_safe)
24
+ ```
25
+
26
+ Some helpers like the `sanitize` helper will automatically mark strings as
27
+ "HTML safe", so impacted code could also look something like this:
28
+
29
+ ```ruby
30
+ content_tag(:div, "hi", title: sanitize(user_input))
31
+ ```
32
+
33
+ All users running an affected release should either upgrade or use one of the
34
+ workarounds immediately.
35
+
36
+ Workarounds
37
+ -----------
38
+ You can work around this issue by either *not* marking arbitrary user input as
39
+ safe, or by manually escaping quotes like this:
40
+
41
+ ```ruby
42
+ def escape_quotes(value)
43
+ value.gsub(/"/, '&quot;'.freeze)
44
+ end
45
+
46
+ content_tag(:div, "hi", title: escape_quotes(sanitize(user_input)))
47
+ ```
48
+
49
+ unaffected_versions:
50
+ - "< 3.0.0"
51
+ # Newer versions are affected, but tracked in the actionview gem.
52
+ - ">= 4.1.0"
53
+
54
+ patched_versions:
55
+ - ~> 3.2.22.3
56
+ - ~> 4.2.7.1
57
+ - ">= 5.0.0.1"