bundler-audit 0.5.0 → 0.8.0.rc1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +5 -5
- data/.github/workflows/ruby.yml +28 -0
- data/.gitignore +1 -1
- data/.rspec +1 -1
- data/ChangeLog.md +84 -1
- data/Gemfile +3 -3
- data/README.md +78 -15
- data/Rakefile +10 -27
- data/bin/bundler-audit +3 -0
- data/bundler-audit.gemspec +0 -7
- data/gemspec.yml +3 -3
- data/lib/bundler/audit.rb +1 -1
- data/lib/bundler/audit/advisory.rb +58 -7
- data/lib/bundler/audit/cli.rb +96 -77
- data/lib/bundler/audit/cli/formats.rb +144 -0
- data/lib/bundler/audit/cli/formats/json.rb +51 -0
- data/lib/bundler/audit/cli/formats/text.rb +116 -0
- data/lib/bundler/audit/configuration.rb +101 -0
- data/lib/bundler/audit/database.rb +148 -22
- data/lib/bundler/audit/report.rb +149 -0
- data/lib/bundler/audit/results.rb +19 -0
- data/lib/bundler/audit/results/insecure_source.rb +75 -0
- data/lib/bundler/audit/results/result.rb +21 -0
- data/lib/bundler/audit/results/unpatched_gem.rb +94 -0
- data/lib/bundler/audit/scanner.rb +102 -26
- data/lib/bundler/audit/task.rb +2 -4
- data/lib/bundler/audit/version.rb +2 -2
- data/spec/advisory_spec.rb +145 -20
- data/spec/bundle/insecure_sources/Gemfile +2 -37
- data/spec/bundle/secure/Gemfile +2 -36
- data/spec/bundle/unpatched_gems/Gemfile +1 -36
- data/spec/bundle/unpatched_gems_with_dot_configuration/.bundler-audit.yml +3 -0
- data/spec/bundle/unpatched_gems_with_dot_configuration/Gemfile +3 -0
- data/spec/cli/formats/json_spec.rb +113 -0
- data/spec/cli/formats/text_spec.rb +179 -0
- data/spec/cli/formats_spec.rb +86 -0
- data/spec/cli_spec.rb +119 -25
- data/spec/configuration_spec.rb +70 -0
- data/spec/database_spec.rb +261 -38
- data/spec/fixtures/advisory/CVE-2020-1234.yml +19 -0
- data/spec/fixtures/{not_a_hash.yml → advisory/not_a_hash.yml} +0 -0
- data/spec/fixtures/config/bad/ignore_contains_a_non_string.yml +4 -0
- data/spec/fixtures/config/bad/ignore_is_not_an_array.yml +3 -0
- data/spec/fixtures/config/valid.yml +4 -0
- data/spec/fixtures/lib/bundler/audit/cli/formats/bad.rb +19 -0
- data/spec/fixtures/lib/bundler/audit/cli/formats/good.rb +19 -0
- data/spec/integration_spec.rb +26 -12
- data/spec/report_spec.rb +98 -0
- data/spec/results/insecure_source_spec.rb +47 -0
- data/spec/results/result_spec.rb +10 -0
- data/spec/results/unpatched_gem_spec.rb +123 -0
- data/spec/scanner_spec.rb +66 -34
- data/spec/spec_helper.rb +37 -36
- metadata +55 -356
- data/.gitmodules +0 -3
- data/.travis.yml +0 -7
- data/data/ruby-advisory-db.ts +0 -1
- data/data/ruby-advisory-db/.gitignore +0 -2
- data/data/ruby-advisory-db/.rspec +0 -1
- data/data/ruby-advisory-db/.travis.yml +0 -18
- data/data/ruby-advisory-db/CONTRIBUTING.md +0 -56
- data/data/ruby-advisory-db/CONTRIBUTORS.md +0 -38
- data/data/ruby-advisory-db/Gemfile +0 -9
- data/data/ruby-advisory-db/LICENSE.txt +0 -5
- data/data/ruby-advisory-db/README.md +0 -82
- data/data/ruby-advisory-db/Rakefile +0 -26
- data/data/ruby-advisory-db/gems/Arabic-Prawn/OSVDB-104365.yml +0 -12
- data/data/ruby-advisory-db/gems/RedCloth/OSVDB-115941.yml +0 -16
- data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4995.yml +0 -13
- data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4996.yml +0 -13
- data/data/ruby-advisory-db/gems/actionmailer/OSVDB-98629.yml +0 -17
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-0130.yml +0 -23
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7818.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7829.yml +0 -26
- data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7576.yml +0 -116
- data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7581.yml +0 -55
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-0751.yml +0 -71
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +0 -20
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +0 -21
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +0 -27
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +0 -22
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-103439.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-103440.yml +0 -22
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-74616.yml +0 -18
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-77199.yml +0 -23
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-79727.yml +0 -26
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-84243.yml +0 -28
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-84513.yml +0 -23
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-84515.yml +0 -26
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-89026.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +0 -20
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +0 -23
- data/data/ruby-advisory-db/gems/actionview/CVE-2016-0752.yml +0 -92
- data/data/ruby-advisory-db/gems/activemodel/CVE-2016-0753.yml +0 -92
- data/data/ruby-advisory-db/gems/activerecord-jdbc-adapter/OSVDB-114854.yml +0 -20
- data/data/ruby-advisory-db/gems/activerecord-oracle_enhanced-adapter/OSVDB-95376.yml +0 -15
- data/data/ruby-advisory-db/gems/activerecord/CVE-2014-3514.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/CVE-2015-7577.yml +0 -107
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-103438.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-108664.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-108665.yml +0 -24
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-82403.yml +0 -25
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-82610.yml +0 -24
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-88661.yml +0 -20
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-89025.yml +0 -24
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-90072.yml +0 -21
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-90073.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-91453.yml +0 -26
- data/data/ruby-advisory-db/gems/activeresource/OSVDB-95749.yml +0 -15
- data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3226.yml +0 -54
- data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3227.yml +0 -32
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-79726.yml +0 -26
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-84516.yml +0 -23
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-89594.yml +0 -25
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-91451.yml +0 -28
- data/data/ruby-advisory-db/gems/as/OSVDB-112683.yml +0 -10
- data/data/ruby-advisory-db/gems/authlogic/OSVDB-89064.yml +0 -15
- data/data/ruby-advisory-db/gems/auto_awesomplete/OSVDB-132800.yml +0 -11
- data/data/ruby-advisory-db/gems/auto_select2/OSVDB-132800.yml +0 -13
- data/data/ruby-advisory-db/gems/awesome_spawn/CVE-2014-0156.yml +0 -19
- data/data/ruby-advisory-db/gems/backup-agoddard/OSVDB-108578.yml +0 -8
- data/data/ruby-advisory-db/gems/backup_checksum/OSVDB-108569.yml +0 -12
- data/data/ruby-advisory-db/gems/backup_checksum/OSVDB-108570.yml +0 -10
- data/data/ruby-advisory-db/gems/bcrypt-ruby/OSVDB-62067.yml +0 -19
- data/data/ruby-advisory-db/gems/bcrypt/OSVDB-62067.yml +0 -17
- data/data/ruby-advisory-db/gems/bio-basespace-sdk/OSVDB-101031.yml +0 -8
- data/data/ruby-advisory-db/gems/brbackup/OSVDB-108899.yml +0 -12
- data/data/ruby-advisory-db/gems/brbackup/OSVDB-108900.yml +0 -11
- data/data/ruby-advisory-db/gems/brbackup/OSVDB-108901.yml +0 -11
- data/data/ruby-advisory-db/gems/bson/CVE-2015-4412.yml +0 -16
- data/data/ruby-advisory-db/gems/builder/OSVDB-95668.yml +0 -13
- data/data/ruby-advisory-db/gems/bundler/OSVDB-110004.yml +0 -15
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115090.yml +0 -13
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115091.yml +0 -12
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115917.yml +0 -12
- data/data/ruby-advisory-db/gems/cap-strap/OSVDB-108574.yml +0 -8
- data/data/ruby-advisory-db/gems/cap-strap/OSVDB-108575.yml +0 -7
- data/data/ruby-advisory-db/gems/ciborg/OSVDB-108586.yml +0 -8
- data/data/ruby-advisory-db/gems/cocaine/OSVDB-98835.yml +0 -15
- data/data/ruby-advisory-db/gems/codders-dataset/OSVDB-108582.yml +0 -8
- data/data/ruby-advisory-db/gems/codders-dataset/OSVDB-108583.yml +0 -8
- data/data/ruby-advisory-db/gems/colorscore/CVE-2015-7541.yml +0 -20
- data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +0 -9
- data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +0 -17
- data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +0 -11
- data/data/ruby-advisory-db/gems/curb/OSVDB-114600.yml +0 -12
- data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +0 -13
- data/data/ruby-advisory-db/gems/devise-two-factor/CVE-2015-7225.yml +0 -22
- data/data/ruby-advisory-db/gems/devise/CVE-2015-8314.yml +0 -14
- data/data/ruby-advisory-db/gems/devise/OSVDB-114435.yml +0 -17
- data/data/ruby-advisory-db/gems/devise/OSVDB-89642.yml +0 -20
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2014-8144.yml +0 -26
- data/data/ruby-advisory-db/gems/doorkeeper/OSVDB-118830.yml +0 -17
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-110439.yml +0 -13
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +0 -16
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-96798.yml +0 -14
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-97854.yml +0 -12
- data/data/ruby-advisory-db/gems/echor/OSVDB-102129.yml +0 -12
- data/data/ruby-advisory-db/gems/echor/OSVDB-102130.yml +0 -11
- data/data/ruby-advisory-db/gems/ember-source/CVE-2013-4170.yml +0 -25
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0013.yml +0 -33
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0014.yml +0 -30
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml +0 -26
- data/data/ruby-advisory-db/gems/ember-source/CVE-2015-1866.yml +0 -26
- data/data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml +0 -30
- data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +0 -9
- data/data/ruby-advisory-db/gems/extlib/OSVDB-90740.yml +0 -18
- data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +0 -13
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101445.yml +0 -17
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101446.yml +0 -19
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101447.yml +0 -17
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101448.yml +0 -19
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-101700.yml +0 -16
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-110420.yml +0 -19
- data/data/ruby-advisory-db/gems/fat_free_crm/OSVDB-118465.yml +0 -17
- data/data/ruby-advisory-db/gems/features/OSVDB-96975.yml +0 -8
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +0 -7
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +0 -7
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +0 -8
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90718.yml +0 -7
- data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +0 -8
- data/data/ruby-advisory-db/gems/flavour_saver/OSVDB-110796.yml +0 -14
- data/data/ruby-advisory-db/gems/flukso4r/OSVDB-101577.yml +0 -7
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-110439.yml +0 -15
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-90647.yml +0 -16
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-96798.yml +0 -16
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-97854.yml +0 -12
- data/data/ruby-advisory-db/gems/ftpd/OSVDB-90784.yml +0 -18
- data/data/ruby-advisory-db/gems/gitlab-grit/OSVDB-99370.yml +0 -14
- data/data/ruby-advisory-db/gems/gnms/OSVDB-108594.yml +0 -7
- data/data/ruby-advisory-db/gems/gollum-grit_adapter/CVE-2014-9489.yml +0 -23
- data/data/ruby-advisory-db/gems/gollum/CVE-2015-7314.yml +0 -13
- data/data/ruby-advisory-db/gems/gtk2/OSVDB-40774.yml +0 -20
- data/data/ruby-advisory-db/gems/gyazo/OSVDB-108563.yml +0 -10
- data/data/ruby-advisory-db/gems/handlebars-source/OSVDB-131671.yml +0 -17
- data/data/ruby-advisory-db/gems/http/CVE-2015-1828.yml +0 -14
- data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +0 -14
- data/data/ruby-advisory-db/gems/i18n/OSVDB-100528.yml +0 -17
- data/data/ruby-advisory-db/gems/jquery-rails/CVE-2015-1840.yml +0 -36
- data/data/ruby-advisory-db/gems/jquery-ujs/CVE-2015-1840.yml +0 -35
- data/data/ruby-advisory-db/gems/jruby-openssl/CVE-2009-4123.yml +0 -16
- data/data/ruby-advisory-db/gems/jruby-sandbox/OSVDB-106279.yml +0 -12
- data/data/ruby-advisory-db/gems/json/OSVDB-101137.yml +0 -17
- data/data/ruby-advisory-db/gems/json/OSVDB-101157.yml +0 -14
- data/data/ruby-advisory-db/gems/json/OSVDB-90074.yml +0 -23
- data/data/ruby-advisory-db/gems/kafo/OSVDB-106826.yml +0 -15
- data/data/ruby-advisory-db/gems/kajam/OSVDB-108529.yml +0 -12
- data/data/ruby-advisory-db/gems/kajam/OSVDB-108530.yml +0 -11
- data/data/ruby-advisory-db/gems/karo/OSVDB-108573.yml +0 -10
- data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +0 -9
- data/data/ruby-advisory-db/gems/kcapifony/OSVDB-108571.yml +0 -8
- data/data/ruby-advisory-db/gems/kcapifony/OSVDB-108572.yml +0 -7
- data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +0 -9
- data/data/ruby-advisory-db/gems/kompanee-recipes/OSVDB-108593.yml +0 -12
- data/data/ruby-advisory-db/gems/lawn-login/OSVDB-108576.yml +0 -8
- data/data/ruby-advisory-db/gems/ldap_fluff/OSVDB-90579.yml +0 -15
- data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +0 -9
- data/data/ruby-advisory-db/gems/lean-ruport/OSVDB-108581.yml +0 -8
- data/data/ruby-advisory-db/gems/lingq/OSVDB-108585.yml +0 -7
- data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +0 -21
- data/data/ruby-advisory-db/gems/lynx/OSVDB-108579.yml +0 -7
- data/data/ruby-advisory-db/gems/lynx/OSVDB-108580.yml +0 -8
- data/data/ruby-advisory-db/gems/mail/OSVDB-131677.yml +0 -19
- data/data/ruby-advisory-db/gems/mail/OSVDB-70667.yml +0 -21
- data/data/ruby-advisory-db/gems/mail/OSVDB-81631.yml +0 -14
- data/data/ruby-advisory-db/gems/mail/OSVDB-81632.yml +0 -16
- data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml +0 -21
- data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-132871.yml +0 -22
- data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +0 -9
- data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +0 -15
- data/data/ruby-advisory-db/gems/moped/CVE-2015-4410.yml +0 -17
- data/data/ruby-advisory-db/gems/multi_xml/OSVDB-89148.yml +0 -16
- data/data/ruby-advisory-db/gems/mustache-js-rails/OSVDB-131671.yml +0 -17
- data/data/ruby-advisory-db/gems/net-ldap/OSVDB-106108.yml +0 -14
- data/data/ruby-advisory-db/gems/newrelic_rpm/OSVDB-90189.yml +0 -17
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-1819.yml +0 -52
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-5312.yml +0 -92
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml +0 -37
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101179.yml +0 -18
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101458.yml +0 -15
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-118481.yml +0 -15
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-90946.yml +0 -15
- data/data/ruby-advisory-db/gems/nori/OSVDB-90196.yml +0 -19
- data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99693.yml +0 -22
- data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99888.yml +0 -17
- data/data/ruby-advisory-db/gems/omniauth-oauth2/OSVDB-90264.yml +0 -16
- data/data/ruby-advisory-db/gems/open-uri-cached/OSVDB-121701.yml +0 -13
- data/data/ruby-advisory-db/gems/paperclip/CVE-2015-2963.yml +0 -16
- data/data/ruby-advisory-db/gems/paperclip/OSVDB-103151.yml +0 -13
- data/data/ruby-advisory-db/gems/paratrooper-newrelic/OSVDB-101839.yml +0 -13
- data/data/ruby-advisory-db/gems/paratrooper-pingdom/OSVDB-101847.yml +0 -13
- data/data/ruby-advisory-db/gems/passenger/CVE-2014-1831.yml +0 -13
- data/data/ruby-advisory-db/gems/passenger/CVE-2014-1832.yml +0 -13
- data/data/ruby-advisory-db/gems/passenger/CVE-2015-7519.yml +0 -17
- data/data/ruby-advisory-db/gems/passenger/OSVDB-90738.yml +0 -16
- data/data/ruby-advisory-db/gems/passenger/OSVDB-93752.yml +0 -15
- data/data/ruby-advisory-db/gems/passenger/OSVDB-94074.yml +0 -14
- data/data/ruby-advisory-db/gems/pdfkit/OSVDB-90867.yml +0 -11
- data/data/ruby-advisory-db/gems/point-cli/OSVDB-108577.yml +0 -8
- data/data/ruby-advisory-db/gems/quick_magick/OSVDB-106954.yml +0 -7
- data/data/ruby-advisory-db/gems/rack-attack/OSVDB-132234.yml +0 -26
- data/data/ruby-advisory-db/gems/rack-cache/OSVDB-83077.yml +0 -18
- data/data/ruby-advisory-db/gems/rack-ssl/OSVDB-104734.yml +0 -11
- data/data/ruby-advisory-db/gems/rack/CVE-2015-3225.yml +0 -18
- data/data/ruby-advisory-db/gems/rack/OSVDB-78121.yml +0 -21
- data/data/ruby-advisory-db/gems/rack/OSVDB-89317.yml +0 -21
- data/data/ruby-advisory-db/gems/rack/OSVDB-89320.yml +0 -19
- data/data/ruby-advisory-db/gems/rack/OSVDB-89327.yml +0 -20
- data/data/ruby-advisory-db/gems/rack/OSVDB-89938.yml +0 -18
- data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +0 -23
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7578.yml +0 -47
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7579.yml +0 -75
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7580.yml +0 -70
- data/data/ruby-advisory-db/gems/rbovirt/OSVDB-104080.yml +0 -20
- data/data/ruby-advisory-db/gems/rdoc/OSVDB-90004.yml +0 -27
- data/data/ruby-advisory-db/gems/redcarpet/CVE-2015-5147.yml +0 -17
- data/data/ruby-advisory-db/gems/redcarpet/OSVDB-120415.yml +0 -16
- data/data/ruby-advisory-db/gems/redis-namespace/OSVDB-96425.yml +0 -15
- data/data/ruby-advisory-db/gems/refile/OSVDB-120857.yml +0 -16
- data/data/ruby-advisory-db/gems/rest-client/CVE-2015-1820.yml +0 -23
- data/data/ruby-advisory-db/gems/rest-client/OSVDB-117461.yml +0 -13
- data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +0 -15
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-117903.yml +0 -13
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124383.yml +0 -11
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124991.yml +0 -13
- data/data/ruby-advisory-db/gems/ruby_parser/OSVDB-90561.yml +0 -11
- data/data/ruby-advisory-db/gems/screen_capture/OSVDB-107783.yml +0 -7
- data/data/ruby-advisory-db/gems/sentry-raven/OSVDB-115654.yml +0 -14
- data/data/ruby-advisory-db/gems/sfpagent/OSVDB-105971.yml +0 -15
- data/data/ruby-advisory-db/gems/show_in_browser/OSVDB-93490.yml +0 -8
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126329.yml +0 -12
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126330.yml +0 -10
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126331.yml +0 -14
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125675.yml +0 -9
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125676.yml +0 -14
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125678.yml +0 -9
- data/data/ruby-advisory-db/gems/sounder/OSVDB-96278.yml +0 -14
- data/data/ruby-advisory-db/gems/spree/OSVDB-119205.yml +0 -18
- data/data/ruby-advisory-db/gems/spree/OSVDB-125699.yml +0 -18
- data/data/ruby-advisory-db/gems/spree/OSVDB-125701.yml +0 -17
- data/data/ruby-advisory-db/gems/spree/OSVDB-125712.yml +0 -16
- data/data/ruby-advisory-db/gems/spree/OSVDB-125713.yml +0 -15
- data/data/ruby-advisory-db/gems/spree/OSVDB-69098.yml +0 -19
- data/data/ruby-advisory-db/gems/spree/OSVDB-73751.yml +0 -11
- data/data/ruby-advisory-db/gems/spree/OSVDB-76011.yml +0 -15
- data/data/ruby-advisory-db/gems/spree/OSVDB-81505.yml +0 -14
- data/data/ruby-advisory-db/gems/spree/OSVDB-81506.yml +0 -16
- data/data/ruby-advisory-db/gems/spree/OSVDB-90865.yml +0 -20
- data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +0 -17
- data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +0 -17
- data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +0 -17
- data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +0 -17
- data/data/ruby-advisory-db/gems/spree_auth/OSVDB-90865.yml +0 -16
- data/data/ruby-advisory-db/gems/spree_auth_devise/OSVDB-90865.yml +0 -20
- data/data/ruby-advisory-db/gems/sprockets/CVE-2014-7819.yml +0 -27
- data/data/ruby-advisory-db/gems/sprout/OSVDB-100598.yml +0 -16
- data/data/ruby-advisory-db/gems/sup/CVE-2013-4478.yml +0 -14
- data/data/ruby-advisory-db/gems/sup/CVE-2013-4479.yml +0 -14
- data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +0 -9
- data/data/ruby-advisory-db/gems/twitter-bootstrap-rails/OSVDB-109206.yml +0 -22
- data/data/ruby-advisory-db/gems/uglifier/OSVDB-126747.yml +0 -19
- data/data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml +0 -22
- data/data/ruby-advisory-db/gems/web-console/OSVDB-112346.yml +0 -12
- data/data/ruby-advisory-db/gems/webbynode/OSVDB-100920.yml +0 -12
- data/data/ruby-advisory-db/gems/wicked/OSVDB-98270.yml +0 -14
- data/data/ruby-advisory-db/gems/will_paginate/OSVDB-101138.yml +0 -15
- data/data/ruby-advisory-db/gems/xaviershay-dm-rails/OSVDB-118579.yml +0 -13
- data/data/ruby-advisory-db/lib/cf_scrape.py +0 -5
- data/data/ruby-advisory-db/lib/osvdb_scrape.rb +0 -92
- data/data/ruby-advisory-db/libraries/rubygems/CVE-2013-4287.yml +0 -19
- data/data/ruby-advisory-db/libraries/rubygems/CVE-2013-4363.yml +0 -20
- data/data/ruby-advisory-db/libraries/rubygems/CVE-2015-3900.yml +0 -19
- data/data/ruby-advisory-db/libraries/rubygems/CVE-2015-4020.yml +0 -19
- data/data/ruby-advisory-db/libraries/rubygems/OSVDB-33561.yml +0 -17
- data/data/ruby-advisory-db/libraries/rubygems/OSVDB-81444.yml +0 -14
- data/data/ruby-advisory-db/libraries/rubygems/OSVDB-85809.yml +0 -16
- data/data/ruby-advisory-db/rubies/jruby/CVE-2010-1330.yml +0 -17
- data/data/ruby-advisory-db/rubies/jruby/CVE-2011-4838.yml +0 -15
- data/data/ruby-advisory-db/rubies/jruby/CVE-2012-5370.yml +0 -17
- data/data/ruby-advisory-db/rubies/jruby/OSVDB-94644.yml +0 -12
- data/data/ruby-advisory-db/rubies/rbx/OSVDB-78119.yml +0 -13
- data/data/ruby-advisory-db/rubies/rbx/OSVDB-87861.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5162.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5770.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1447.yml +0 -15
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1891.yml +0 -21
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2376.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3443.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3655.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3656.yml +0 -19
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3657.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3905.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-0642.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-5147.yml +0 -13
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-0188.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2705.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-3009.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4464.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4466.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4481.yml +0 -15
- data/data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml +0 -19
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-100113.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-105027.yml +0 -20
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-107478.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-108971.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-113747.yml +0 -19
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-114641.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-120541.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-46550.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-46551.yml +0 -21
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-46552.yml +0 -21
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-46553.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-46554.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-47753.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-55031.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-60880.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-61774.yml +0 -20
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-65556.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-66040.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-70957.yml +0 -15
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-70958.yml +0 -20
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-74829.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-78118.yml +0 -14
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-87280.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-87863.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-87917.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-90587.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-93414.yml +0 -19
- data/data/ruby-advisory-db/rubies/ruby/OSVDB-94628.yml +0 -21
- data/data/ruby-advisory-db/scripts/post-advisories.sh +0 -18
- data/data/ruby-advisory-db/spec/advisory_example.rb +0 -187
- data/data/ruby-advisory-db/spec/gem_example.rb +0 -22
- data/data/ruby-advisory-db/spec/gems_spec.rb +0 -23
- data/data/ruby-advisory-db/spec/library_example.rb +0 -21
- data/data/ruby-advisory-db/spec/ruby_example.rb +0 -23
- data/data/ruby-advisory-db/spec/spec_helper.rb +0 -1
@@ -1,55 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2015-7581
|
5
|
-
date: 2016-01-25
|
6
|
-
url: "https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE"
|
7
|
-
|
8
|
-
title: Object leak vulnerability for wildcard controller routes in Action Pack
|
9
|
-
|
10
|
-
description: |
|
11
|
-
There is an object leak vulnerability for wildcard controllers in Action Pack.
|
12
|
-
This vulnerability has been assigned the CVE identifier CVE-2015-7581.
|
13
|
-
|
14
|
-
Versions Affected: >= 4.0.0 and < 5.0.0.beta1
|
15
|
-
Not affected: < 4.0.0, 5.0.0.beta1 and newer
|
16
|
-
Fixed Versions: 4.2.5.1, 4.1.14.1
|
17
|
-
|
18
|
-
Impact
|
19
|
-
------
|
20
|
-
Users that have a route that contains the string ":controller" are susceptible
|
21
|
-
to objects being leaked globally which can lead to unbounded memory growth.
|
22
|
-
To identify if your application is vulnerable, look for routes that contain
|
23
|
-
":controller".
|
24
|
-
|
25
|
-
Internally, Action Pack keeps a map of "url controller name" to "controller
|
26
|
-
class name". This map is cached globally, and is populated even if the
|
27
|
-
controller class doesn't actually exist.
|
28
|
-
|
29
|
-
All users running an affected release should either upgrade or use one of the
|
30
|
-
workarounds immediately.
|
31
|
-
|
32
|
-
Releases
|
33
|
-
--------
|
34
|
-
The FIXED releases are available at the normal locations.
|
35
|
-
|
36
|
-
Workarounds
|
37
|
-
-----------
|
38
|
-
There are no feasible workarounds for this issue.
|
39
|
-
|
40
|
-
Patches
|
41
|
-
-------
|
42
|
-
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
|
43
|
-
|
44
|
-
* 4-1-wildcard_route.patch - Patch for 4.1 series
|
45
|
-
* 4-2-wildcard_route.patch - Patch for 4.2 series
|
46
|
-
|
47
|
-
Please note that only the 4.1.x and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
|
48
|
-
|
49
|
-
unaffected_versions:
|
50
|
-
- "< 4.0.0"
|
51
|
-
- ">= 5.0.0.beta1"
|
52
|
-
|
53
|
-
patched_versions:
|
54
|
-
- "~> 4.2.5.1"
|
55
|
-
- "~> 4.1.14.1"
|
@@ -1,71 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2016-0751
|
5
|
-
date: 2016-01-25
|
6
|
-
url: "https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc"
|
7
|
-
|
8
|
-
title: Possible Object Leak and Denial of Service attack in Action Pack
|
9
|
-
|
10
|
-
description: |
|
11
|
-
There is a possible object leak which can lead to a denial of service
|
12
|
-
vulnerability in Action Pack. This vulnerability has been
|
13
|
-
assigned the CVE identifier CVE-2016-0751.
|
14
|
-
|
15
|
-
Versions Affected: All.
|
16
|
-
Not affected: None.
|
17
|
-
Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
|
18
|
-
|
19
|
-
Impact
|
20
|
-
------
|
21
|
-
A carefully crafted accept header can cause a global cache of mime types to
|
22
|
-
grow indefinitely which can lead to a possible denial of service attack in
|
23
|
-
Action Pack.
|
24
|
-
|
25
|
-
All users running an affected release should either upgrade or use one of the
|
26
|
-
workarounds immediately.
|
27
|
-
|
28
|
-
Releases
|
29
|
-
--------
|
30
|
-
The FIXED releases are available at the normal locations.
|
31
|
-
|
32
|
-
Workarounds
|
33
|
-
-----------
|
34
|
-
This attack can be mitigated by a proxy that only allows known mime types in
|
35
|
-
the Accept header.
|
36
|
-
|
37
|
-
Placing the following code in an initializer will also mitigate the issue:
|
38
|
-
|
39
|
-
```ruby
|
40
|
-
require 'action_dispatch/http/mime_type'
|
41
|
-
|
42
|
-
Mime.const_set :LOOKUP, Hash.new { |h,k|
|
43
|
-
Mime::Type.new(k) unless k.blank?
|
44
|
-
}
|
45
|
-
```
|
46
|
-
|
47
|
-
Patches
|
48
|
-
-------
|
49
|
-
To aid users who aren't able to upgrade immediately we have provided patches for
|
50
|
-
the two supported release series. They are in git-am format and consist of a
|
51
|
-
single changeset.
|
52
|
-
|
53
|
-
* 5-0-mime_types_leak.patch - Patch for 5.0 series
|
54
|
-
* 4-2-mime_types_leak.patch - Patch for 4.2 series
|
55
|
-
* 4-1-mime_types_leak.patch - Patch for 4.1 series
|
56
|
-
* 3-2-mime_types_leak.patch - Patch for 3.2 series
|
57
|
-
|
58
|
-
Please note that only the 4.1.x and 4.2.x series are supported at present. Users
|
59
|
-
of earlier unsupported releases are advised to upgrade as soon as possible as we
|
60
|
-
cannot guarantee the continued availability of security fixes for unsupported
|
61
|
-
releases.
|
62
|
-
|
63
|
-
Credits
|
64
|
-
-------
|
65
|
-
Aaron Patterson <3<3
|
66
|
-
|
67
|
-
patched_versions:
|
68
|
-
- "~> 5.0.0.beta1.1"
|
69
|
-
- "~> 4.2.5.1"
|
70
|
-
- "~> 4.1.14.1"
|
71
|
-
- "~> 3.2.22.1"
|
@@ -1,20 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2013-6415
|
5
|
-
osvdb: 100524
|
6
|
-
url: https://groups.google.com/forum/#!topic/ruby-security-ann/9WiRn2nhfq0
|
7
|
-
title: XSS Vulnerability in number_to_currency
|
8
|
-
date: 2013-12-03
|
9
|
-
|
10
|
-
description: |
|
11
|
-
There is an XSS vulnerability in the number_to_currency helper in Ruby on Raile.
|
12
|
-
The number_to_currency helper allows users to nicely format a numeric value. One
|
13
|
-
of the parameters to the helper (unit) is not escaped correctly. Applications
|
14
|
-
which pass user controlled data as the unit parameter are vulnerable to an XSS attack.
|
15
|
-
|
16
|
-
cvss_v2: 4.3
|
17
|
-
|
18
|
-
patched_versions:
|
19
|
-
- ~> 3.2.16
|
20
|
-
- ">= 4.0.2"
|
@@ -1,21 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2013-6414
|
5
|
-
osvdb: 100525
|
6
|
-
url: https://groups.google.com/forum/#!topic/ruby-security-ann/A-ebV4WxzKg
|
7
|
-
title: Denial of Service Vulnerability in Action View
|
8
|
-
date: 2013-12-03
|
9
|
-
|
10
|
-
description: |
|
11
|
-
There is a denial of service vulnerability in the header handling component of
|
12
|
-
Action View.
|
13
|
-
|
14
|
-
cvss_v2: 5.0
|
15
|
-
|
16
|
-
unaffected_versions:
|
17
|
-
- ~> 2.3.0
|
18
|
-
|
19
|
-
patched_versions:
|
20
|
-
- ~> 3.2.16
|
21
|
-
- ">= 4.0.2"
|
@@ -1,27 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2013-6416
|
5
|
-
osvdb: 100526
|
6
|
-
url: https://groups.google.com/forum/#!topic/ruby-security-ann/5ZI1-H5OoIM
|
7
|
-
title: XSS Vulnerability in simple_format helper
|
8
|
-
date: 2013-12-03
|
9
|
-
|
10
|
-
description: |
|
11
|
-
There is a vulnerability in the simple_format helper in Ruby on Rails.
|
12
|
-
The simple_format helper converts user supplied text into html text
|
13
|
-
which is intended to be safe for display. A change made to the
|
14
|
-
implementation of this helper means that any user provided HTML
|
15
|
-
attributes will not be escaped correctly. As a result of this error,
|
16
|
-
applications which pass user-controlled data to be included as html
|
17
|
-
attributes will be vulnerable to an XSS attack.
|
18
|
-
|
19
|
-
cvss_v2: 4.3
|
20
|
-
|
21
|
-
unaffected_versions:
|
22
|
-
- ~> 2.3.0
|
23
|
-
- ~> 3.1.0
|
24
|
-
- ~> 3.2.0
|
25
|
-
|
26
|
-
patched_versions:
|
27
|
-
- ">= 4.0.2"
|
@@ -1,24 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2013-6417
|
5
|
-
osvdb: 100527
|
6
|
-
url: https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4
|
7
|
-
title: Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)
|
8
|
-
date: 2013-12-03
|
9
|
-
|
10
|
-
description: |
|
11
|
-
The prior fix to CVE-2013-0155 was incomplete and the use of common
|
12
|
-
3rd party libraries can accidentally circumvent the protection. Due
|
13
|
-
to the way that Rack::Request and Rails::Request interact, it is
|
14
|
-
possible for a 3rd party or custom rack middleware to parse the
|
15
|
-
parameters insecurely and store them in the same key that Rails uses
|
16
|
-
for its own parameters. In the event that happens the application
|
17
|
-
will receive unsafe parameters and could be vulnerable to the earlier
|
18
|
-
vulnerability.
|
19
|
-
|
20
|
-
cvss_v2: 6.4
|
21
|
-
|
22
|
-
patched_versions:
|
23
|
-
- ~> 3.2.16
|
24
|
-
- ">= 4.0.2"
|
@@ -1,22 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2013-4491
|
5
|
-
osvdb: 100528
|
6
|
-
url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
|
7
|
-
title: Reflective XSS Vulnerability in Ruby on Rails
|
8
|
-
date: 2013-12-03
|
9
|
-
|
10
|
-
description: |
|
11
|
-
There is a vulnerability in the internationalization component of Ruby on
|
12
|
-
Rails. Under certain common configurations an attacker can provide specially
|
13
|
-
crafted input which will execute a reflective XSS attack.
|
14
|
-
|
15
|
-
The root cause of this issue is a vulnerability in the i18n gem which has
|
16
|
-
been assigned the identifier CVE-2013-4492.
|
17
|
-
|
18
|
-
cvss_v2: 4.3
|
19
|
-
|
20
|
-
patched_versions:
|
21
|
-
- ~> 3.2.16
|
22
|
-
- ">= 4.0.2"
|
@@ -1,24 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2014-0081
|
5
|
-
osvdb: 103439
|
6
|
-
url: http://osvdb.org/show/osvdb/103439
|
7
|
-
title: XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human
|
8
|
-
date: 2014-02-18
|
9
|
-
|
10
|
-
description: |
|
11
|
-
Ruby on Rails contains a flaw that allows a cross-site scripting (XSS) attack.
|
12
|
-
This flaw exists because the actionpack/lib/action_view/helpers/number_helper.rb
|
13
|
-
script does not validate input to the 'number_to_currency', 'number_to_percentage',
|
14
|
-
and 'number_to_human' helpers before returning it to users. This may allow a
|
15
|
-
remote attacker to create a specially crafted request that would execute arbitrary
|
16
|
-
script code in a user's browser session within the trust relationship between
|
17
|
-
their browser and the server.
|
18
|
-
|
19
|
-
cvss_v2: 4.3
|
20
|
-
|
21
|
-
patched_versions:
|
22
|
-
- ~> 3.2.17
|
23
|
-
- ~> 4.0.3
|
24
|
-
- ">= 4.1.0.beta2"
|
@@ -1,22 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2014-0082
|
5
|
-
osvdb: 103440
|
6
|
-
url: http://osvdb.org/show/osvdb/103440
|
7
|
-
title: Denial of Service Vulnerability in Action View when using render :text
|
8
|
-
date: 2014-02-18
|
9
|
-
|
10
|
-
description: |
|
11
|
-
Ruby on Rails contains a flaw in actionpack/lib/action_view/template/text.rb
|
12
|
-
in the text rendering component of Action View that is triggered when
|
13
|
-
handling MIME types that are converted to symbols. This may allow a
|
14
|
-
remote attacker to cause a denial of service.
|
15
|
-
|
16
|
-
cvss_v2: 5.0
|
17
|
-
|
18
|
-
unaffected_versions:
|
19
|
-
- ~> 4.0.0
|
20
|
-
|
21
|
-
patched_versions:
|
22
|
-
- ">= 3.2.17"
|
@@ -1,18 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2011-3186
|
5
|
-
osvdb: 74616
|
6
|
-
url: https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g
|
7
|
-
title: Response Splitting Vulnerability in Ruby on Rails
|
8
|
-
date: 2011-08-16
|
9
|
-
|
10
|
-
description: |
|
11
|
-
A response splitting flaw in Ruby on Rails 2.3.x was reported that could allow
|
12
|
-
a remote attacker to inject arbitrary HTTP headers into a response due to
|
13
|
-
insufficient sanitization of the values provided for response content types.
|
14
|
-
|
15
|
-
cvss_v2: 4.3
|
16
|
-
|
17
|
-
patched_versions:
|
18
|
-
- ">= 2.3.13"
|
@@ -1,23 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2011-4319
|
5
|
-
osvdb: 77199
|
6
|
-
url: https://groups.google.com/forum/#!topic/rubyonrails-security/K2HXD7c8fMU
|
7
|
-
title: XSS vulnerability in the translate helper method in Ruby on Rails
|
8
|
-
date: 2011-11-17
|
9
|
-
|
10
|
-
description: |
|
11
|
-
A cross-site scripting (XSS) flaw was found in the way the 'translate' helper
|
12
|
-
method of the Ruby on Rails performed HTML escaping of interpolated user
|
13
|
-
input, when interpolation in combination with HTML-safe translations were
|
14
|
-
used. A remote attacker could use this flaw to execute arbitrary HTML or web
|
15
|
-
script by providing a specially-crafted input to Ruby on Rails application,
|
16
|
-
using the ActionPack module and its 'translate' helper method without explicit
|
17
|
-
(application specific) sanitization of user provided input.
|
18
|
-
|
19
|
-
cvss_v2: 4.3
|
20
|
-
|
21
|
-
patched_versions:
|
22
|
-
- "~> 3.0.11"
|
23
|
-
- ">= 3.1.2"
|
@@ -1,26 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2012-1099
|
5
|
-
osvdb: 79727
|
6
|
-
url: http://www.osvdb.org/show/osvdb/79727
|
7
|
-
title:
|
8
|
-
Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb
|
9
|
-
Manually Generated Select Tag Options XSS
|
10
|
-
date: 2012-03-01
|
11
|
-
|
12
|
-
description: |
|
13
|
-
Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
|
14
|
-
attack. This flaw exists because the application does not validate manually
|
15
|
-
generated 'select tag options' upon submission to
|
16
|
-
actionpack/lib/action_view/helpers/form_options_helper.rb. This may allow a
|
17
|
-
user to create a specially crafted request that would execute arbitrary
|
18
|
-
script code in a user's browser within the trust relationship between their
|
19
|
-
browser and the server.
|
20
|
-
|
21
|
-
cvss_v2: 4.3
|
22
|
-
|
23
|
-
patched_versions:
|
24
|
-
- ~> 3.0.12
|
25
|
-
- ~> 3.1.4
|
26
|
-
- ">= 3.2.2"
|
@@ -1,28 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2012-3424
|
5
|
-
osvdb: 84243
|
6
|
-
url: http://www.osvdb.org/show/osvdb/84243
|
7
|
-
title:
|
8
|
-
Ruby on Rails actionpack/lib/action_controller/metal/http_authentication.rb
|
9
|
-
with_http_digest Helper Method Remote DoS
|
10
|
-
date: 2012-07-26
|
11
|
-
|
12
|
-
description: |
|
13
|
-
Ruby on Rails contains a flaw that may allow a remote denial of service.
|
14
|
-
The issue is triggered when an error occurs in
|
15
|
-
actionpack/lib/action_controller/metal/http_authentication.rb when the
|
16
|
-
with_http_digest helper method is being used. This may allow a remote
|
17
|
-
attacker to cause a loss of availability for the program.
|
18
|
-
|
19
|
-
cvss_v2: 5.0
|
20
|
-
|
21
|
-
unaffected_versions:
|
22
|
-
- ">= 2.3.5, <= 2.3.14"
|
23
|
-
|
24
|
-
patched_versions:
|
25
|
-
- ~> 3.0.16
|
26
|
-
- ~> 3.1.7
|
27
|
-
- ">= 3.2.7"
|
28
|
-
|
@@ -1,23 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2012-3465
|
5
|
-
osvdb: 84513
|
6
|
-
url: http://www.osvdb.org/show/osvdb/84513
|
7
|
-
title: Ruby on Rails strip_tags Helper Method XSS
|
8
|
-
date: 2012-08-09
|
9
|
-
|
10
|
-
description: |
|
11
|
-
Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
|
12
|
-
attack. This flaw exists because the application does not validate input
|
13
|
-
passed via the 'strip_tags' helper method before returning it to the user.
|
14
|
-
This may allow a user to create a specially crafted request that would
|
15
|
-
execute arbitrary script code in a user's browser within the trust
|
16
|
-
relationship between their browser and the server.
|
17
|
-
|
18
|
-
cvss_v2: 4.3
|
19
|
-
|
20
|
-
patched_versions:
|
21
|
-
- ~> 3.0.17
|
22
|
-
- ~> 3.1.8
|
23
|
-
- ">= 3.2.8"
|
@@ -1,26 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: actionpack
|
3
|
-
framework: rails
|
4
|
-
cve: 2012-3463
|
5
|
-
osvdb: 84515
|
6
|
-
url: http://osvdb.org/84515
|
7
|
-
title: Ruby on Rails select_tag Helper Method prompt Value XSS
|
8
|
-
date: 2012-08-09
|
9
|
-
|
10
|
-
description: |
|
11
|
-
Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
|
12
|
-
attack. This flaw exists because input passed via the prompt value is not
|
13
|
-
properly sanitized by the select_tag helper method before returning it to
|
14
|
-
the user. This may allow a user to create a specially crafted request that
|
15
|
-
would execute arbitrary script code in a user's browser within the trust
|
16
|
-
relationship between their browser and the server.
|
17
|
-
|
18
|
-
cvss_v2: 4.3
|
19
|
-
|
20
|
-
unaffected_versions:
|
21
|
-
- ~> 2.3.0
|
22
|
-
|
23
|
-
patched_versions:
|
24
|
-
- ~> 3.0.17
|
25
|
-
- ~> 3.1.8
|
26
|
-
- ">= 3.2.8"
|