bundler-audit 0.5.0 → 0.8.0.rc1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (398) hide show
  1. checksums.yaml +5 -5
  2. data/.github/workflows/ruby.yml +28 -0
  3. data/.gitignore +1 -1
  4. data/.rspec +1 -1
  5. data/ChangeLog.md +84 -1
  6. data/Gemfile +3 -3
  7. data/README.md +78 -15
  8. data/Rakefile +10 -27
  9. data/bin/bundler-audit +3 -0
  10. data/bundler-audit.gemspec +0 -7
  11. data/gemspec.yml +3 -3
  12. data/lib/bundler/audit.rb +1 -1
  13. data/lib/bundler/audit/advisory.rb +58 -7
  14. data/lib/bundler/audit/cli.rb +96 -77
  15. data/lib/bundler/audit/cli/formats.rb +144 -0
  16. data/lib/bundler/audit/cli/formats/json.rb +51 -0
  17. data/lib/bundler/audit/cli/formats/text.rb +116 -0
  18. data/lib/bundler/audit/configuration.rb +101 -0
  19. data/lib/bundler/audit/database.rb +148 -22
  20. data/lib/bundler/audit/report.rb +149 -0
  21. data/lib/bundler/audit/results.rb +19 -0
  22. data/lib/bundler/audit/results/insecure_source.rb +75 -0
  23. data/lib/bundler/audit/results/result.rb +21 -0
  24. data/lib/bundler/audit/results/unpatched_gem.rb +94 -0
  25. data/lib/bundler/audit/scanner.rb +102 -26
  26. data/lib/bundler/audit/task.rb +2 -4
  27. data/lib/bundler/audit/version.rb +2 -2
  28. data/spec/advisory_spec.rb +145 -20
  29. data/spec/bundle/insecure_sources/Gemfile +2 -37
  30. data/spec/bundle/secure/Gemfile +2 -36
  31. data/spec/bundle/unpatched_gems/Gemfile +1 -36
  32. data/spec/bundle/unpatched_gems_with_dot_configuration/.bundler-audit.yml +3 -0
  33. data/spec/bundle/unpatched_gems_with_dot_configuration/Gemfile +3 -0
  34. data/spec/cli/formats/json_spec.rb +113 -0
  35. data/spec/cli/formats/text_spec.rb +179 -0
  36. data/spec/cli/formats_spec.rb +86 -0
  37. data/spec/cli_spec.rb +119 -25
  38. data/spec/configuration_spec.rb +70 -0
  39. data/spec/database_spec.rb +261 -38
  40. data/spec/fixtures/advisory/CVE-2020-1234.yml +19 -0
  41. data/spec/fixtures/{not_a_hash.yml → advisory/not_a_hash.yml} +0 -0
  42. data/spec/fixtures/config/bad/ignore_contains_a_non_string.yml +4 -0
  43. data/spec/fixtures/config/bad/ignore_is_not_an_array.yml +3 -0
  44. data/spec/fixtures/config/valid.yml +4 -0
  45. data/spec/fixtures/lib/bundler/audit/cli/formats/bad.rb +19 -0
  46. data/spec/fixtures/lib/bundler/audit/cli/formats/good.rb +19 -0
  47. data/spec/integration_spec.rb +26 -12
  48. data/spec/report_spec.rb +98 -0
  49. data/spec/results/insecure_source_spec.rb +47 -0
  50. data/spec/results/result_spec.rb +10 -0
  51. data/spec/results/unpatched_gem_spec.rb +123 -0
  52. data/spec/scanner_spec.rb +66 -34
  53. data/spec/spec_helper.rb +37 -36
  54. metadata +55 -356
  55. data/.gitmodules +0 -3
  56. data/.travis.yml +0 -7
  57. data/data/ruby-advisory-db.ts +0 -1
  58. data/data/ruby-advisory-db/.gitignore +0 -2
  59. data/data/ruby-advisory-db/.rspec +0 -1
  60. data/data/ruby-advisory-db/.travis.yml +0 -18
  61. data/data/ruby-advisory-db/CONTRIBUTING.md +0 -56
  62. data/data/ruby-advisory-db/CONTRIBUTORS.md +0 -38
  63. data/data/ruby-advisory-db/Gemfile +0 -9
  64. data/data/ruby-advisory-db/LICENSE.txt +0 -5
  65. data/data/ruby-advisory-db/README.md +0 -82
  66. data/data/ruby-advisory-db/Rakefile +0 -26
  67. data/data/ruby-advisory-db/gems/Arabic-Prawn/OSVDB-104365.yml +0 -12
  68. data/data/ruby-advisory-db/gems/RedCloth/OSVDB-115941.yml +0 -16
  69. data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4995.yml +0 -13
  70. data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4996.yml +0 -13
  71. data/data/ruby-advisory-db/gems/actionmailer/OSVDB-98629.yml +0 -17
  72. data/data/ruby-advisory-db/gems/actionpack/CVE-2014-0130.yml +0 -23
  73. data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7818.yml +0 -24
  74. data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7829.yml +0 -26
  75. data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7576.yml +0 -116
  76. data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7581.yml +0 -55
  77. data/data/ruby-advisory-db/gems/actionpack/CVE-2016-0751.yml +0 -71
  78. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +0 -20
  79. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +0 -21
  80. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +0 -27
  81. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +0 -24
  82. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +0 -22
  83. data/data/ruby-advisory-db/gems/actionpack/OSVDB-103439.yml +0 -24
  84. data/data/ruby-advisory-db/gems/actionpack/OSVDB-103440.yml +0 -22
  85. data/data/ruby-advisory-db/gems/actionpack/OSVDB-74616.yml +0 -18
  86. data/data/ruby-advisory-db/gems/actionpack/OSVDB-77199.yml +0 -23
  87. data/data/ruby-advisory-db/gems/actionpack/OSVDB-79727.yml +0 -26
  88. data/data/ruby-advisory-db/gems/actionpack/OSVDB-84243.yml +0 -28
  89. data/data/ruby-advisory-db/gems/actionpack/OSVDB-84513.yml +0 -23
  90. data/data/ruby-advisory-db/gems/actionpack/OSVDB-84515.yml +0 -26
  91. data/data/ruby-advisory-db/gems/actionpack/OSVDB-89026.yml +0 -24
  92. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +0 -20
  93. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +0 -23
  94. data/data/ruby-advisory-db/gems/actionview/CVE-2016-0752.yml +0 -92
  95. data/data/ruby-advisory-db/gems/activemodel/CVE-2016-0753.yml +0 -92
  96. data/data/ruby-advisory-db/gems/activerecord-jdbc-adapter/OSVDB-114854.yml +0 -20
  97. data/data/ruby-advisory-db/gems/activerecord-oracle_enhanced-adapter/OSVDB-95376.yml +0 -15
  98. data/data/ruby-advisory-db/gems/activerecord/CVE-2014-3514.yml +0 -23
  99. data/data/ruby-advisory-db/gems/activerecord/CVE-2015-7577.yml +0 -107
  100. data/data/ruby-advisory-db/gems/activerecord/OSVDB-103438.yml +0 -23
  101. data/data/ruby-advisory-db/gems/activerecord/OSVDB-108664.yml +0 -23
  102. data/data/ruby-advisory-db/gems/activerecord/OSVDB-108665.yml +0 -24
  103. data/data/ruby-advisory-db/gems/activerecord/OSVDB-82403.yml +0 -25
  104. data/data/ruby-advisory-db/gems/activerecord/OSVDB-82610.yml +0 -24
  105. data/data/ruby-advisory-db/gems/activerecord/OSVDB-88661.yml +0 -20
  106. data/data/ruby-advisory-db/gems/activerecord/OSVDB-89025.yml +0 -24
  107. data/data/ruby-advisory-db/gems/activerecord/OSVDB-90072.yml +0 -21
  108. data/data/ruby-advisory-db/gems/activerecord/OSVDB-90073.yml +0 -23
  109. data/data/ruby-advisory-db/gems/activerecord/OSVDB-91453.yml +0 -26
  110. data/data/ruby-advisory-db/gems/activeresource/OSVDB-95749.yml +0 -15
  111. data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3226.yml +0 -54
  112. data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3227.yml +0 -32
  113. data/data/ruby-advisory-db/gems/activesupport/OSVDB-79726.yml +0 -26
  114. data/data/ruby-advisory-db/gems/activesupport/OSVDB-84516.yml +0 -23
  115. data/data/ruby-advisory-db/gems/activesupport/OSVDB-89594.yml +0 -25
  116. data/data/ruby-advisory-db/gems/activesupport/OSVDB-91451.yml +0 -28
  117. data/data/ruby-advisory-db/gems/as/OSVDB-112683.yml +0 -10
  118. data/data/ruby-advisory-db/gems/authlogic/OSVDB-89064.yml +0 -15
  119. data/data/ruby-advisory-db/gems/auto_awesomplete/OSVDB-132800.yml +0 -11
  120. data/data/ruby-advisory-db/gems/auto_select2/OSVDB-132800.yml +0 -13
  121. data/data/ruby-advisory-db/gems/awesome_spawn/CVE-2014-0156.yml +0 -19
  122. data/data/ruby-advisory-db/gems/backup-agoddard/OSVDB-108578.yml +0 -8
  123. data/data/ruby-advisory-db/gems/backup_checksum/OSVDB-108569.yml +0 -12
  124. data/data/ruby-advisory-db/gems/backup_checksum/OSVDB-108570.yml +0 -10
  125. data/data/ruby-advisory-db/gems/bcrypt-ruby/OSVDB-62067.yml +0 -19
  126. data/data/ruby-advisory-db/gems/bcrypt/OSVDB-62067.yml +0 -17
  127. data/data/ruby-advisory-db/gems/bio-basespace-sdk/OSVDB-101031.yml +0 -8
  128. data/data/ruby-advisory-db/gems/brbackup/OSVDB-108899.yml +0 -12
  129. data/data/ruby-advisory-db/gems/brbackup/OSVDB-108900.yml +0 -11
  130. data/data/ruby-advisory-db/gems/brbackup/OSVDB-108901.yml +0 -11
  131. data/data/ruby-advisory-db/gems/bson/CVE-2015-4412.yml +0 -16
  132. data/data/ruby-advisory-db/gems/builder/OSVDB-95668.yml +0 -13
  133. data/data/ruby-advisory-db/gems/bundler/OSVDB-110004.yml +0 -15
  134. data/data/ruby-advisory-db/gems/bundler/OSVDB-115090.yml +0 -13
  135. data/data/ruby-advisory-db/gems/bundler/OSVDB-115091.yml +0 -12
  136. data/data/ruby-advisory-db/gems/bundler/OSVDB-115917.yml +0 -12
  137. data/data/ruby-advisory-db/gems/cap-strap/OSVDB-108574.yml +0 -8
  138. data/data/ruby-advisory-db/gems/cap-strap/OSVDB-108575.yml +0 -7
  139. data/data/ruby-advisory-db/gems/ciborg/OSVDB-108586.yml +0 -8
  140. data/data/ruby-advisory-db/gems/cocaine/OSVDB-98835.yml +0 -15
  141. data/data/ruby-advisory-db/gems/codders-dataset/OSVDB-108582.yml +0 -8
  142. data/data/ruby-advisory-db/gems/codders-dataset/OSVDB-108583.yml +0 -8
  143. data/data/ruby-advisory-db/gems/colorscore/CVE-2015-7541.yml +0 -20
  144. data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +0 -9
  145. data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +0 -17
  146. data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +0 -11
  147. data/data/ruby-advisory-db/gems/curb/OSVDB-114600.yml +0 -12
  148. data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +0 -13
  149. data/data/ruby-advisory-db/gems/devise-two-factor/CVE-2015-7225.yml +0 -22
  150. data/data/ruby-advisory-db/gems/devise/CVE-2015-8314.yml +0 -14
  151. data/data/ruby-advisory-db/gems/devise/OSVDB-114435.yml +0 -17
  152. data/data/ruby-advisory-db/gems/devise/OSVDB-89642.yml +0 -20
  153. data/data/ruby-advisory-db/gems/doorkeeper/CVE-2014-8144.yml +0 -26
  154. data/data/ruby-advisory-db/gems/doorkeeper/OSVDB-118830.yml +0 -17
  155. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-110439.yml +0 -13
  156. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +0 -16
  157. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-96798.yml +0 -14
  158. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-97854.yml +0 -12
  159. data/data/ruby-advisory-db/gems/echor/OSVDB-102129.yml +0 -12
  160. data/data/ruby-advisory-db/gems/echor/OSVDB-102130.yml +0 -11
  161. data/data/ruby-advisory-db/gems/ember-source/CVE-2013-4170.yml +0 -25
  162. data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0013.yml +0 -33
  163. data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0014.yml +0 -30
  164. data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml +0 -26
  165. data/data/ruby-advisory-db/gems/ember-source/CVE-2015-1866.yml +0 -26
  166. data/data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml +0 -30
  167. data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +0 -9
  168. data/data/ruby-advisory-db/gems/extlib/OSVDB-90740.yml +0 -18
  169. data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +0 -13
  170. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101445.yml +0 -17
  171. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101446.yml +0 -19
  172. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101447.yml +0 -17
  173. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101448.yml +0 -19
  174. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101700.yml +0 -16
  175. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-110420.yml +0 -19
  176. data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-118465.yml +0 -17
  177. data/data/ruby-advisory-db/gems/features/OSVDB-96975.yml +0 -8
  178. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +0 -7
  179. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +0 -7
  180. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +0 -8
  181. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90718.yml +0 -7
  182. data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +0 -8
  183. data/data/ruby-advisory-db/gems/flavour_saver/OSVDB-110796.yml +0 -14
  184. data/data/ruby-advisory-db/gems/flukso4r/OSVDB-101577.yml +0 -7
  185. data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-110439.yml +0 -15
  186. data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-90647.yml +0 -16
  187. data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-96798.yml +0 -16
  188. data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-97854.yml +0 -12
  189. data/data/ruby-advisory-db/gems/ftpd/OSVDB-90784.yml +0 -18
  190. data/data/ruby-advisory-db/gems/gitlab-grit/OSVDB-99370.yml +0 -14
  191. data/data/ruby-advisory-db/gems/gnms/OSVDB-108594.yml +0 -7
  192. data/data/ruby-advisory-db/gems/gollum-grit_adapter/CVE-2014-9489.yml +0 -23
  193. data/data/ruby-advisory-db/gems/gollum/CVE-2015-7314.yml +0 -13
  194. data/data/ruby-advisory-db/gems/gtk2/OSVDB-40774.yml +0 -20
  195. data/data/ruby-advisory-db/gems/gyazo/OSVDB-108563.yml +0 -10
  196. data/data/ruby-advisory-db/gems/handlebars-source/OSVDB-131671.yml +0 -17
  197. data/data/ruby-advisory-db/gems/http/CVE-2015-1828.yml +0 -14
  198. data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +0 -14
  199. data/data/ruby-advisory-db/gems/i18n/OSVDB-100528.yml +0 -17
  200. data/data/ruby-advisory-db/gems/jquery-rails/CVE-2015-1840.yml +0 -36
  201. data/data/ruby-advisory-db/gems/jquery-ujs/CVE-2015-1840.yml +0 -35
  202. data/data/ruby-advisory-db/gems/jruby-openssl/CVE-2009-4123.yml +0 -16
  203. data/data/ruby-advisory-db/gems/jruby-sandbox/OSVDB-106279.yml +0 -12
  204. data/data/ruby-advisory-db/gems/json/OSVDB-101137.yml +0 -17
  205. data/data/ruby-advisory-db/gems/json/OSVDB-101157.yml +0 -14
  206. data/data/ruby-advisory-db/gems/json/OSVDB-90074.yml +0 -23
  207. data/data/ruby-advisory-db/gems/kafo/OSVDB-106826.yml +0 -15
  208. data/data/ruby-advisory-db/gems/kajam/OSVDB-108529.yml +0 -12
  209. data/data/ruby-advisory-db/gems/kajam/OSVDB-108530.yml +0 -11
  210. data/data/ruby-advisory-db/gems/karo/OSVDB-108573.yml +0 -10
  211. data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +0 -9
  212. data/data/ruby-advisory-db/gems/kcapifony/OSVDB-108571.yml +0 -8
  213. data/data/ruby-advisory-db/gems/kcapifony/OSVDB-108572.yml +0 -7
  214. data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +0 -9
  215. data/data/ruby-advisory-db/gems/kompanee-recipes/OSVDB-108593.yml +0 -12
  216. data/data/ruby-advisory-db/gems/lawn-login/OSVDB-108576.yml +0 -8
  217. data/data/ruby-advisory-db/gems/ldap_fluff/OSVDB-90579.yml +0 -15
  218. data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +0 -9
  219. data/data/ruby-advisory-db/gems/lean-ruport/OSVDB-108581.yml +0 -8
  220. data/data/ruby-advisory-db/gems/lingq/OSVDB-108585.yml +0 -7
  221. data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +0 -21
  222. data/data/ruby-advisory-db/gems/lynx/OSVDB-108579.yml +0 -7
  223. data/data/ruby-advisory-db/gems/lynx/OSVDB-108580.yml +0 -8
  224. data/data/ruby-advisory-db/gems/mail/OSVDB-131677.yml +0 -19
  225. data/data/ruby-advisory-db/gems/mail/OSVDB-70667.yml +0 -21
  226. data/data/ruby-advisory-db/gems/mail/OSVDB-81631.yml +0 -14
  227. data/data/ruby-advisory-db/gems/mail/OSVDB-81632.yml +0 -16
  228. data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml +0 -21
  229. data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-132871.yml +0 -22
  230. data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +0 -9
  231. data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +0 -15
  232. data/data/ruby-advisory-db/gems/moped/CVE-2015-4410.yml +0 -17
  233. data/data/ruby-advisory-db/gems/multi_xml/OSVDB-89148.yml +0 -16
  234. data/data/ruby-advisory-db/gems/mustache-js-rails/OSVDB-131671.yml +0 -17
  235. data/data/ruby-advisory-db/gems/net-ldap/OSVDB-106108.yml +0 -14
  236. data/data/ruby-advisory-db/gems/newrelic_rpm/OSVDB-90189.yml +0 -17
  237. data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-1819.yml +0 -52
  238. data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-5312.yml +0 -92
  239. data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml +0 -37
  240. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101179.yml +0 -18
  241. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101458.yml +0 -15
  242. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-118481.yml +0 -15
  243. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-90946.yml +0 -15
  244. data/data/ruby-advisory-db/gems/nori/OSVDB-90196.yml +0 -19
  245. data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99693.yml +0 -22
  246. data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99888.yml +0 -17
  247. data/data/ruby-advisory-db/gems/omniauth-oauth2/OSVDB-90264.yml +0 -16
  248. data/data/ruby-advisory-db/gems/open-uri-cached/OSVDB-121701.yml +0 -13
  249. data/data/ruby-advisory-db/gems/paperclip/CVE-2015-2963.yml +0 -16
  250. data/data/ruby-advisory-db/gems/paperclip/OSVDB-103151.yml +0 -13
  251. data/data/ruby-advisory-db/gems/paratrooper-newrelic/OSVDB-101839.yml +0 -13
  252. data/data/ruby-advisory-db/gems/paratrooper-pingdom/OSVDB-101847.yml +0 -13
  253. data/data/ruby-advisory-db/gems/passenger/CVE-2014-1831.yml +0 -13
  254. data/data/ruby-advisory-db/gems/passenger/CVE-2014-1832.yml +0 -13
  255. data/data/ruby-advisory-db/gems/passenger/CVE-2015-7519.yml +0 -17
  256. data/data/ruby-advisory-db/gems/passenger/OSVDB-90738.yml +0 -16
  257. data/data/ruby-advisory-db/gems/passenger/OSVDB-93752.yml +0 -15
  258. data/data/ruby-advisory-db/gems/passenger/OSVDB-94074.yml +0 -14
  259. data/data/ruby-advisory-db/gems/pdfkit/OSVDB-90867.yml +0 -11
  260. data/data/ruby-advisory-db/gems/point-cli/OSVDB-108577.yml +0 -8
  261. data/data/ruby-advisory-db/gems/quick_magick/OSVDB-106954.yml +0 -7
  262. data/data/ruby-advisory-db/gems/rack-attack/OSVDB-132234.yml +0 -26
  263. data/data/ruby-advisory-db/gems/rack-cache/OSVDB-83077.yml +0 -18
  264. data/data/ruby-advisory-db/gems/rack-ssl/OSVDB-104734.yml +0 -11
  265. data/data/ruby-advisory-db/gems/rack/CVE-2015-3225.yml +0 -18
  266. data/data/ruby-advisory-db/gems/rack/OSVDB-78121.yml +0 -21
  267. data/data/ruby-advisory-db/gems/rack/OSVDB-89317.yml +0 -21
  268. data/data/ruby-advisory-db/gems/rack/OSVDB-89320.yml +0 -19
  269. data/data/ruby-advisory-db/gems/rack/OSVDB-89327.yml +0 -20
  270. data/data/ruby-advisory-db/gems/rack/OSVDB-89938.yml +0 -18
  271. data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +0 -23
  272. data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7578.yml +0 -47
  273. data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7579.yml +0 -75
  274. data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7580.yml +0 -70
  275. data/data/ruby-advisory-db/gems/rbovirt/OSVDB-104080.yml +0 -20
  276. data/data/ruby-advisory-db/gems/rdoc/OSVDB-90004.yml +0 -27
  277. data/data/ruby-advisory-db/gems/redcarpet/CVE-2015-5147.yml +0 -17
  278. data/data/ruby-advisory-db/gems/redcarpet/OSVDB-120415.yml +0 -16
  279. data/data/ruby-advisory-db/gems/redis-namespace/OSVDB-96425.yml +0 -15
  280. data/data/ruby-advisory-db/gems/refile/OSVDB-120857.yml +0 -16
  281. data/data/ruby-advisory-db/gems/rest-client/CVE-2015-1820.yml +0 -23
  282. data/data/ruby-advisory-db/gems/rest-client/OSVDB-117461.yml +0 -13
  283. data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +0 -15
  284. data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-117903.yml +0 -13
  285. data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124383.yml +0 -11
  286. data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124991.yml +0 -13
  287. data/data/ruby-advisory-db/gems/ruby_parser/OSVDB-90561.yml +0 -11
  288. data/data/ruby-advisory-db/gems/screen_capture/OSVDB-107783.yml +0 -7
  289. data/data/ruby-advisory-db/gems/sentry-raven/OSVDB-115654.yml +0 -14
  290. data/data/ruby-advisory-db/gems/sfpagent/OSVDB-105971.yml +0 -15
  291. data/data/ruby-advisory-db/gems/show_in_browser/OSVDB-93490.yml +0 -8
  292. data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126329.yml +0 -12
  293. data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126330.yml +0 -10
  294. data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126331.yml +0 -14
  295. data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125675.yml +0 -9
  296. data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125676.yml +0 -14
  297. data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125678.yml +0 -9
  298. data/data/ruby-advisory-db/gems/sounder/OSVDB-96278.yml +0 -14
  299. data/data/ruby-advisory-db/gems/spree/OSVDB-119205.yml +0 -18
  300. data/data/ruby-advisory-db/gems/spree/OSVDB-125699.yml +0 -18
  301. data/data/ruby-advisory-db/gems/spree/OSVDB-125701.yml +0 -17
  302. data/data/ruby-advisory-db/gems/spree/OSVDB-125712.yml +0 -16
  303. data/data/ruby-advisory-db/gems/spree/OSVDB-125713.yml +0 -15
  304. data/data/ruby-advisory-db/gems/spree/OSVDB-69098.yml +0 -19
  305. data/data/ruby-advisory-db/gems/spree/OSVDB-73751.yml +0 -11
  306. data/data/ruby-advisory-db/gems/spree/OSVDB-76011.yml +0 -15
  307. data/data/ruby-advisory-db/gems/spree/OSVDB-81505.yml +0 -14
  308. data/data/ruby-advisory-db/gems/spree/OSVDB-81506.yml +0 -16
  309. data/data/ruby-advisory-db/gems/spree/OSVDB-90865.yml +0 -20
  310. data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +0 -17
  311. data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +0 -17
  312. data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +0 -17
  313. data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +0 -17
  314. data/data/ruby-advisory-db/gems/spree_auth/OSVDB-90865.yml +0 -16
  315. data/data/ruby-advisory-db/gems/spree_auth_devise/OSVDB-90865.yml +0 -20
  316. data/data/ruby-advisory-db/gems/sprockets/CVE-2014-7819.yml +0 -27
  317. data/data/ruby-advisory-db/gems/sprout/OSVDB-100598.yml +0 -16
  318. data/data/ruby-advisory-db/gems/sup/CVE-2013-4478.yml +0 -14
  319. data/data/ruby-advisory-db/gems/sup/CVE-2013-4479.yml +0 -14
  320. data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +0 -9
  321. data/data/ruby-advisory-db/gems/twitter-bootstrap-rails/OSVDB-109206.yml +0 -22
  322. data/data/ruby-advisory-db/gems/uglifier/OSVDB-126747.yml +0 -19
  323. data/data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml +0 -22
  324. data/data/ruby-advisory-db/gems/web-console/OSVDB-112346.yml +0 -12
  325. data/data/ruby-advisory-db/gems/webbynode/OSVDB-100920.yml +0 -12
  326. data/data/ruby-advisory-db/gems/wicked/OSVDB-98270.yml +0 -14
  327. data/data/ruby-advisory-db/gems/will_paginate/OSVDB-101138.yml +0 -15
  328. data/data/ruby-advisory-db/gems/xaviershay-dm-rails/OSVDB-118579.yml +0 -13
  329. data/data/ruby-advisory-db/lib/cf_scrape.py +0 -5
  330. data/data/ruby-advisory-db/lib/osvdb_scrape.rb +0 -92
  331. data/data/ruby-advisory-db/libraries/rubygems/CVE-2013-4287.yml +0 -19
  332. data/data/ruby-advisory-db/libraries/rubygems/CVE-2013-4363.yml +0 -20
  333. data/data/ruby-advisory-db/libraries/rubygems/CVE-2015-3900.yml +0 -19
  334. data/data/ruby-advisory-db/libraries/rubygems/CVE-2015-4020.yml +0 -19
  335. data/data/ruby-advisory-db/libraries/rubygems/OSVDB-33561.yml +0 -17
  336. data/data/ruby-advisory-db/libraries/rubygems/OSVDB-81444.yml +0 -14
  337. data/data/ruby-advisory-db/libraries/rubygems/OSVDB-85809.yml +0 -16
  338. data/data/ruby-advisory-db/rubies/jruby/CVE-2010-1330.yml +0 -17
  339. data/data/ruby-advisory-db/rubies/jruby/CVE-2011-4838.yml +0 -15
  340. data/data/ruby-advisory-db/rubies/jruby/CVE-2012-5370.yml +0 -17
  341. data/data/ruby-advisory-db/rubies/jruby/OSVDB-94644.yml +0 -12
  342. data/data/ruby-advisory-db/rubies/rbx/OSVDB-78119.yml +0 -13
  343. data/data/ruby-advisory-db/rubies/rbx/OSVDB-87861.yml +0 -17
  344. data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5162.yml +0 -16
  345. data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5770.yml +0 -17
  346. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1447.yml +0 -15
  347. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1891.yml +0 -21
  348. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2376.yml +0 -18
  349. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3443.yml +0 -17
  350. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3655.yml +0 -18
  351. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3656.yml +0 -19
  352. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3657.yml +0 -16
  353. data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3905.yml +0 -17
  354. data/data/ruby-advisory-db/rubies/ruby/CVE-2009-0642.yml +0 -17
  355. data/data/ruby-advisory-db/rubies/ruby/CVE-2009-5147.yml +0 -13
  356. data/data/ruby-advisory-db/rubies/ruby/CVE-2011-0188.yml +0 -17
  357. data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml +0 -17
  358. data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2705.yml +0 -16
  359. data/data/ruby-advisory-db/rubies/ruby/CVE-2011-3009.yml +0 -17
  360. data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4464.yml +0 -17
  361. data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4466.yml +0 -16
  362. data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4481.yml +0 -15
  363. data/data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml +0 -19
  364. data/data/ruby-advisory-db/rubies/ruby/OSVDB-100113.yml +0 -17
  365. data/data/ruby-advisory-db/rubies/ruby/OSVDB-105027.yml +0 -20
  366. data/data/ruby-advisory-db/rubies/ruby/OSVDB-107478.yml +0 -16
  367. data/data/ruby-advisory-db/rubies/ruby/OSVDB-108971.yml +0 -17
  368. data/data/ruby-advisory-db/rubies/ruby/OSVDB-113747.yml +0 -19
  369. data/data/ruby-advisory-db/rubies/ruby/OSVDB-114641.yml +0 -22
  370. data/data/ruby-advisory-db/rubies/ruby/OSVDB-120541.yml +0 -22
  371. data/data/ruby-advisory-db/rubies/ruby/OSVDB-46550.yml +0 -22
  372. data/data/ruby-advisory-db/rubies/ruby/OSVDB-46551.yml +0 -21
  373. data/data/ruby-advisory-db/rubies/ruby/OSVDB-46552.yml +0 -21
  374. data/data/ruby-advisory-db/rubies/ruby/OSVDB-46553.yml +0 -22
  375. data/data/ruby-advisory-db/rubies/ruby/OSVDB-46554.yml +0 -18
  376. data/data/ruby-advisory-db/rubies/ruby/OSVDB-47753.yml +0 -16
  377. data/data/ruby-advisory-db/rubies/ruby/OSVDB-55031.yml +0 -17
  378. data/data/ruby-advisory-db/rubies/ruby/OSVDB-60880.yml +0 -17
  379. data/data/ruby-advisory-db/rubies/ruby/OSVDB-61774.yml +0 -20
  380. data/data/ruby-advisory-db/rubies/ruby/OSVDB-65556.yml +0 -17
  381. data/data/ruby-advisory-db/rubies/ruby/OSVDB-66040.yml +0 -17
  382. data/data/ruby-advisory-db/rubies/ruby/OSVDB-70957.yml +0 -15
  383. data/data/ruby-advisory-db/rubies/ruby/OSVDB-70958.yml +0 -20
  384. data/data/ruby-advisory-db/rubies/ruby/OSVDB-74829.yml +0 -18
  385. data/data/ruby-advisory-db/rubies/ruby/OSVDB-78118.yml +0 -14
  386. data/data/ruby-advisory-db/rubies/ruby/OSVDB-87280.yml +0 -17
  387. data/data/ruby-advisory-db/rubies/ruby/OSVDB-87863.yml +0 -18
  388. data/data/ruby-advisory-db/rubies/ruby/OSVDB-87917.yml +0 -16
  389. data/data/ruby-advisory-db/rubies/ruby/OSVDB-90587.yml +0 -16
  390. data/data/ruby-advisory-db/rubies/ruby/OSVDB-93414.yml +0 -19
  391. data/data/ruby-advisory-db/rubies/ruby/OSVDB-94628.yml +0 -21
  392. data/data/ruby-advisory-db/scripts/post-advisories.sh +0 -18
  393. data/data/ruby-advisory-db/spec/advisory_example.rb +0 -187
  394. data/data/ruby-advisory-db/spec/gem_example.rb +0 -22
  395. data/data/ruby-advisory-db/spec/gems_spec.rb +0 -23
  396. data/data/ruby-advisory-db/spec/library_example.rb +0 -21
  397. data/data/ruby-advisory-db/spec/ruby_example.rb +0 -23
  398. data/data/ruby-advisory-db/spec/spec_helper.rb +0 -1
@@ -1,55 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2015-7581
5
- date: 2016-01-25
6
- url: "https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE"
7
-
8
- title: Object leak vulnerability for wildcard controller routes in Action Pack
9
-
10
- description: |
11
- There is an object leak vulnerability for wildcard controllers in Action Pack.
12
- This vulnerability has been assigned the CVE identifier CVE-2015-7581.
13
-
14
- Versions Affected: >= 4.0.0 and < 5.0.0.beta1
15
- Not affected: < 4.0.0, 5.0.0.beta1 and newer
16
- Fixed Versions: 4.2.5.1, 4.1.14.1
17
-
18
- Impact
19
- ------
20
- Users that have a route that contains the string ":controller" are susceptible
21
- to objects being leaked globally which can lead to unbounded memory growth.
22
- To identify if your application is vulnerable, look for routes that contain
23
- ":controller".
24
-
25
- Internally, Action Pack keeps a map of "url controller name" to "controller
26
- class name". This map is cached globally, and is populated even if the
27
- controller class doesn't actually exist.
28
-
29
- All users running an affected release should either upgrade or use one of the
30
- workarounds immediately.
31
-
32
- Releases
33
- --------
34
- The FIXED releases are available at the normal locations.
35
-
36
- Workarounds
37
- -----------
38
- There are no feasible workarounds for this issue.
39
-
40
- Patches
41
- -------
42
- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
43
-
44
- * 4-1-wildcard_route.patch - Patch for 4.1 series
45
- * 4-2-wildcard_route.patch - Patch for 4.2 series
46
-
47
- Please note that only the 4.1.x and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
48
-
49
- unaffected_versions:
50
- - "< 4.0.0"
51
- - ">= 5.0.0.beta1"
52
-
53
- patched_versions:
54
- - "~> 4.2.5.1"
55
- - "~> 4.1.14.1"
@@ -1,71 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2016-0751
5
- date: 2016-01-25
6
- url: "https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc"
7
-
8
- title: Possible Object Leak and Denial of Service attack in Action Pack
9
-
10
- description: |
11
- There is a possible object leak which can lead to a denial of service
12
- vulnerability in Action Pack. This vulnerability has been
13
- assigned the CVE identifier CVE-2016-0751.
14
-
15
- Versions Affected: All.
16
- Not affected: None.
17
- Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
18
-
19
- Impact
20
- ------
21
- A carefully crafted accept header can cause a global cache of mime types to
22
- grow indefinitely which can lead to a possible denial of service attack in
23
- Action Pack.
24
-
25
- All users running an affected release should either upgrade or use one of the
26
- workarounds immediately.
27
-
28
- Releases
29
- --------
30
- The FIXED releases are available at the normal locations.
31
-
32
- Workarounds
33
- -----------
34
- This attack can be mitigated by a proxy that only allows known mime types in
35
- the Accept header.
36
-
37
- Placing the following code in an initializer will also mitigate the issue:
38
-
39
- ```ruby
40
- require 'action_dispatch/http/mime_type'
41
-
42
- Mime.const_set :LOOKUP, Hash.new { |h,k|
43
- Mime::Type.new(k) unless k.blank?
44
- }
45
- ```
46
-
47
- Patches
48
- -------
49
- To aid users who aren't able to upgrade immediately we have provided patches for
50
- the two supported release series. They are in git-am format and consist of a
51
- single changeset.
52
-
53
- * 5-0-mime_types_leak.patch - Patch for 5.0 series
54
- * 4-2-mime_types_leak.patch - Patch for 4.2 series
55
- * 4-1-mime_types_leak.patch - Patch for 4.1 series
56
- * 3-2-mime_types_leak.patch - Patch for 3.2 series
57
-
58
- Please note that only the 4.1.x and 4.2.x series are supported at present. Users
59
- of earlier unsupported releases are advised to upgrade as soon as possible as we
60
- cannot guarantee the continued availability of security fixes for unsupported
61
- releases.
62
-
63
- Credits
64
- -------
65
- Aaron Patterson <3<3
66
-
67
- patched_versions:
68
- - "~> 5.0.0.beta1.1"
69
- - "~> 4.2.5.1"
70
- - "~> 4.1.14.1"
71
- - "~> 3.2.22.1"
@@ -1,20 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2013-6415
5
- osvdb: 100524
6
- url: https://groups.google.com/forum/#!topic/ruby-security-ann/9WiRn2nhfq0
7
- title: XSS Vulnerability in number_to_currency
8
- date: 2013-12-03
9
-
10
- description: |
11
- There is an XSS vulnerability in the number_to_currency helper in Ruby on Raile.
12
- The number_to_currency helper allows users to nicely format a numeric value. One
13
- of the parameters to the helper (unit) is not escaped correctly. Applications
14
- which pass user controlled data as the unit parameter are vulnerable to an XSS attack.
15
-
16
- cvss_v2: 4.3
17
-
18
- patched_versions:
19
- - ~> 3.2.16
20
- - ">= 4.0.2"
@@ -1,21 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2013-6414
5
- osvdb: 100525
6
- url: https://groups.google.com/forum/#!topic/ruby-security-ann/A-ebV4WxzKg
7
- title: Denial of Service Vulnerability in Action View
8
- date: 2013-12-03
9
-
10
- description: |
11
- There is a denial of service vulnerability in the header handling component of
12
- Action View.
13
-
14
- cvss_v2: 5.0
15
-
16
- unaffected_versions:
17
- - ~> 2.3.0
18
-
19
- patched_versions:
20
- - ~> 3.2.16
21
- - ">= 4.0.2"
@@ -1,27 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2013-6416
5
- osvdb: 100526
6
- url: https://groups.google.com/forum/#!topic/ruby-security-ann/5ZI1-H5OoIM
7
- title: XSS Vulnerability in simple_format helper
8
- date: 2013-12-03
9
-
10
- description: |
11
- There is a vulnerability in the simple_format helper in Ruby on Rails.
12
- The simple_format helper converts user supplied text into html text
13
- which is intended to be safe for display. A change made to the
14
- implementation of this helper means that any user provided HTML
15
- attributes will not be escaped correctly. As a result of this error,
16
- applications which pass user-controlled data to be included as html
17
- attributes will be vulnerable to an XSS attack.
18
-
19
- cvss_v2: 4.3
20
-
21
- unaffected_versions:
22
- - ~> 2.3.0
23
- - ~> 3.1.0
24
- - ~> 3.2.0
25
-
26
- patched_versions:
27
- - ">= 4.0.2"
@@ -1,24 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2013-6417
5
- osvdb: 100527
6
- url: https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4
7
- title: Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)
8
- date: 2013-12-03
9
-
10
- description: |
11
- The prior fix to CVE-2013-0155 was incomplete and the use of common
12
- 3rd party libraries can accidentally circumvent the protection. Due
13
- to the way that Rack::Request and Rails::Request interact, it is
14
- possible for a 3rd party or custom rack middleware to parse the
15
- parameters insecurely and store them in the same key that Rails uses
16
- for its own parameters. In the event that happens the application
17
- will receive unsafe parameters and could be vulnerable to the earlier
18
- vulnerability.
19
-
20
- cvss_v2: 6.4
21
-
22
- patched_versions:
23
- - ~> 3.2.16
24
- - ">= 4.0.2"
@@ -1,22 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2013-4491
5
- osvdb: 100528
6
- url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
7
- title: Reflective XSS Vulnerability in Ruby on Rails
8
- date: 2013-12-03
9
-
10
- description: |
11
- There is a vulnerability in the internationalization component of Ruby on
12
- Rails. Under certain common configurations an attacker can provide specially
13
- crafted input which will execute a reflective XSS attack.
14
-
15
- The root cause of this issue is a vulnerability in the i18n gem which has
16
- been assigned the identifier CVE-2013-4492.
17
-
18
- cvss_v2: 4.3
19
-
20
- patched_versions:
21
- - ~> 3.2.16
22
- - ">= 4.0.2"
@@ -1,24 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2014-0081
5
- osvdb: 103439
6
- url: http://osvdb.org/show/osvdb/103439
7
- title: XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human
8
- date: 2014-02-18
9
-
10
- description: |
11
- Ruby on Rails contains a flaw that allows a cross-site scripting (XSS) attack.
12
- This flaw exists because the actionpack/lib/action_view/helpers/number_helper.rb
13
- script does not validate input to the 'number_to_currency', 'number_to_percentage',
14
- and 'number_to_human' helpers before returning it to users. This may allow a
15
- remote attacker to create a specially crafted request that would execute arbitrary
16
- script code in a user's browser session within the trust relationship between
17
- their browser and the server.
18
-
19
- cvss_v2: 4.3
20
-
21
- patched_versions:
22
- - ~> 3.2.17
23
- - ~> 4.0.3
24
- - ">= 4.1.0.beta2"
@@ -1,22 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2014-0082
5
- osvdb: 103440
6
- url: http://osvdb.org/show/osvdb/103440
7
- title: Denial of Service Vulnerability in Action View when using render :text
8
- date: 2014-02-18
9
-
10
- description: |
11
- Ruby on Rails contains a flaw in actionpack/lib/action_view/template/text.rb
12
- in the text rendering component of Action View that is triggered when
13
- handling MIME types that are converted to symbols. This may allow a
14
- remote attacker to cause a denial of service.
15
-
16
- cvss_v2: 5.0
17
-
18
- unaffected_versions:
19
- - ~> 4.0.0
20
-
21
- patched_versions:
22
- - ">= 3.2.17"
@@ -1,18 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2011-3186
5
- osvdb: 74616
6
- url: https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g
7
- title: Response Splitting Vulnerability in Ruby on Rails
8
- date: 2011-08-16
9
-
10
- description: |
11
- A response splitting flaw in Ruby on Rails 2.3.x was reported that could allow
12
- a remote attacker to inject arbitrary HTTP headers into a response due to
13
- insufficient sanitization of the values provided for response content types.
14
-
15
- cvss_v2: 4.3
16
-
17
- patched_versions:
18
- - ">= 2.3.13"
@@ -1,23 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2011-4319
5
- osvdb: 77199
6
- url: https://groups.google.com/forum/#!topic/rubyonrails-security/K2HXD7c8fMU
7
- title: XSS vulnerability in the translate helper method in Ruby on Rails
8
- date: 2011-11-17
9
-
10
- description: |
11
- A cross-site scripting (XSS) flaw was found in the way the 'translate' helper
12
- method of the Ruby on Rails performed HTML escaping of interpolated user
13
- input, when interpolation in combination with HTML-safe translations were
14
- used. A remote attacker could use this flaw to execute arbitrary HTML or web
15
- script by providing a specially-crafted input to Ruby on Rails application,
16
- using the ActionPack module and its 'translate' helper method without explicit
17
- (application specific) sanitization of user provided input.
18
-
19
- cvss_v2: 4.3
20
-
21
- patched_versions:
22
- - "~> 3.0.11"
23
- - ">= 3.1.2"
@@ -1,26 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2012-1099
5
- osvdb: 79727
6
- url: http://www.osvdb.org/show/osvdb/79727
7
- title:
8
- Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb
9
- Manually Generated Select Tag Options XSS
10
- date: 2012-03-01
11
-
12
- description: |
13
- Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
14
- attack. This flaw exists because the application does not validate manually
15
- generated 'select tag options' upon submission to
16
- actionpack/lib/action_view/helpers/form_options_helper.rb. This may allow a
17
- user to create a specially crafted request that would execute arbitrary
18
- script code in a user's browser within the trust relationship between their
19
- browser and the server.
20
-
21
- cvss_v2: 4.3
22
-
23
- patched_versions:
24
- - ~> 3.0.12
25
- - ~> 3.1.4
26
- - ">= 3.2.2"
@@ -1,28 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2012-3424
5
- osvdb: 84243
6
- url: http://www.osvdb.org/show/osvdb/84243
7
- title:
8
- Ruby on Rails actionpack/lib/action_controller/metal/http_authentication.rb
9
- with_http_digest Helper Method Remote DoS
10
- date: 2012-07-26
11
-
12
- description: |
13
- Ruby on Rails contains a flaw that may allow a remote denial of service.
14
- The issue is triggered when an error occurs in
15
- actionpack/lib/action_controller/metal/http_authentication.rb when the
16
- with_http_digest helper method is being used. This may allow a remote
17
- attacker to cause a loss of availability for the program.
18
-
19
- cvss_v2: 5.0
20
-
21
- unaffected_versions:
22
- - ">= 2.3.5, <= 2.3.14"
23
-
24
- patched_versions:
25
- - ~> 3.0.16
26
- - ~> 3.1.7
27
- - ">= 3.2.7"
28
-
@@ -1,23 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2012-3465
5
- osvdb: 84513
6
- url: http://www.osvdb.org/show/osvdb/84513
7
- title: Ruby on Rails strip_tags Helper Method XSS
8
- date: 2012-08-09
9
-
10
- description: |
11
- Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
12
- attack. This flaw exists because the application does not validate input
13
- passed via the 'strip_tags' helper method before returning it to the user.
14
- This may allow a user to create a specially crafted request that would
15
- execute arbitrary script code in a user's browser within the trust
16
- relationship between their browser and the server.
17
-
18
- cvss_v2: 4.3
19
-
20
- patched_versions:
21
- - ~> 3.0.17
22
- - ~> 3.1.8
23
- - ">= 3.2.8"
@@ -1,26 +0,0 @@
1
- ---
2
- gem: actionpack
3
- framework: rails
4
- cve: 2012-3463
5
- osvdb: 84515
6
- url: http://osvdb.org/84515
7
- title: Ruby on Rails select_tag Helper Method prompt Value XSS
8
- date: 2012-08-09
9
-
10
- description: |
11
- Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
12
- attack. This flaw exists because input passed via the prompt value is not
13
- properly sanitized by the select_tag helper method before returning it to
14
- the user. This may allow a user to create a specially crafted request that
15
- would execute arbitrary script code in a user's browser within the trust
16
- relationship between their browser and the server.
17
-
18
- cvss_v2: 4.3
19
-
20
- unaffected_versions:
21
- - ~> 2.3.0
22
-
23
- patched_versions:
24
- - ~> 3.0.17
25
- - ~> 3.1.8
26
- - ">= 3.2.8"