bundler-audit 0.7.0.1 → 0.9.0.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.github/FUNDING.yml +3 -0
- data/.github/ISSUE_TEMPLATE/bug-report.md +44 -0
- data/.github/workflows/ruby.yml +42 -0
- data/.gitignore +1 -0
- data/.rspec +1 -1
- data/.rubocop.yml +83 -0
- data/COPYING.txt +4 -4
- data/ChangeLog.md +95 -4
- data/Gemfile +7 -3
- data/README.md +79 -17
- data/Rakefile +7 -26
- data/bundler-audit.gemspec +3 -11
- data/gemspec.yml +2 -2
- data/lib/bundler/audit/advisory.rb +36 -4
- data/lib/bundler/audit/cli/formats/json.rb +65 -0
- data/lib/bundler/audit/cli/formats/junit.rb +127 -0
- data/lib/bundler/audit/cli/formats/text.rb +122 -0
- data/lib/bundler/audit/cli/formats.rb +148 -0
- data/lib/bundler/audit/cli/thor_ext/shell/basic/say_error.rb +33 -0
- data/lib/bundler/audit/cli.rb +111 -93
- data/lib/bundler/audit/configuration.rb +108 -0
- data/lib/bundler/audit/database.rb +153 -30
- data/lib/bundler/audit/report.rb +149 -0
- data/lib/bundler/audit/results/insecure_source.rb +78 -0
- data/lib/bundler/audit/results/result.rb +21 -0
- data/lib/bundler/audit/results/unpatched_gem.rb +98 -0
- data/lib/bundler/audit/results.rb +19 -0
- data/lib/bundler/audit/scanner.rb +101 -22
- data/lib/bundler/audit/task.rb +19 -6
- data/lib/bundler/audit/version.rb +3 -3
- data/lib/bundler/audit.rb +2 -2
- data/spec/advisory_spec.rb +42 -15
- data/spec/bundle/insecure_sources/Gemfile.lock +133 -85
- data/spec/bundle/secure/Gemfile.lock +60 -57
- data/spec/bundle/unpatched_gems/Gemfile.lock +6 -72
- data/spec/bundle/unpatched_gems_with_dot_configuration/.bundler-audit.yml +3 -0
- data/spec/bundle/unpatched_gems_with_dot_configuration/Gemfile +3 -0
- data/spec/bundle/unpatched_gems_with_dot_configuration/Gemfile.lock +31 -0
- data/spec/cli/formats/json_spec.rb +114 -0
- data/spec/cli/formats/junit_spec.rb +284 -0
- data/spec/cli/formats/text_spec.rb +273 -0
- data/spec/cli/formats_spec.rb +86 -0
- data/spec/cli_spec.rb +78 -26
- data/spec/configuration_spec.rb +78 -0
- data/spec/database_spec.rb +273 -52
- data/spec/fixtures/advisory/CVE-2020-1234.yml +21 -0
- data/spec/fixtures/{not_a_hash.yml → advisory/not_a_hash.yml} +0 -0
- data/spec/fixtures/config/bad/empty.yml +0 -0
- data/spec/fixtures/config/bad/ignore_contains_a_non_string.yml +4 -0
- data/spec/fixtures/config/bad/ignore_is_not_an_array.yml +3 -0
- data/spec/fixtures/config/valid.yml +4 -0
- data/spec/fixtures/lib/bundler/audit/cli/formats/bad.rb +17 -0
- data/spec/fixtures/lib/bundler/audit/cli/formats/good.rb +17 -0
- data/spec/integration_spec.rb +17 -89
- data/spec/report_spec.rb +98 -0
- data/spec/results/insecure_source_spec.rb +47 -0
- data/spec/results/result_spec.rb +10 -0
- data/spec/results/unpatched_gem_spec.rb +123 -0
- data/spec/scanner_spec.rb +90 -35
- data/spec/spec_helper.rb +42 -25
- metadata +46 -568
- data/.gitmodules +0 -3
- data/.travis.yml +0 -14
- data/data/ruby-advisory-db/.gitignore +0 -1
- data/data/ruby-advisory-db/.rspec +0 -1
- data/data/ruby-advisory-db/.travis.yml +0 -12
- data/data/ruby-advisory-db/CONTRIBUTING.md +0 -71
- data/data/ruby-advisory-db/CONTRIBUTORS.md +0 -41
- data/data/ruby-advisory-db/Gemfile +0 -11
- data/data/ruby-advisory-db/Gemfile.lock +0 -44
- data/data/ruby-advisory-db/LICENSE.txt +0 -5
- data/data/ruby-advisory-db/README.md +0 -133
- data/data/ruby-advisory-db/Rakefile +0 -22
- data/data/ruby-advisory-db/gems/Arabic-Prawn/CVE-2014-2322.yml +0 -12
- data/data/ruby-advisory-db/gems/RedCloth/CVE-2012-6684.yml +0 -21
- data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4995.yml +0 -13
- data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4996.yml +0 -13
- data/data/ruby-advisory-db/gems/actionmailer/CVE-2013-4389.yml +0 -17
- data/data/ruby-advisory-db/gems/actionpack/CVE-2012-1099.yml +0 -26
- data/data/ruby-advisory-db/gems/actionpack/CVE-2012-3424.yml +0 -28
- data/data/ruby-advisory-db/gems/actionpack/CVE-2012-3463.yml +0 -26
- data/data/ruby-advisory-db/gems/actionpack/CVE-2012-3465.yml +0 -23
- data/data/ruby-advisory-db/gems/actionpack/CVE-2013-0156.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/CVE-2013-1855.yml +0 -20
- data/data/ruby-advisory-db/gems/actionpack/CVE-2013-1857.yml +0 -23
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-0081.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-0082.yml +0 -22
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-0130.yml +0 -23
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7818.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7829.yml +0 -26
- data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7576.yml +0 -119
- data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7581.yml +0 -55
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-0751.yml +0 -74
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-0752.yml +0 -96
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-2097.yml +0 -91
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-2098.yml +0 -89
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-6316.yml +0 -57
- data/data/ruby-advisory-db/gems/actionpack/CVE-2020-8164.yml +0 -49
- data/data/ruby-advisory-db/gems/actionpack/CVE-2020-8166.yml +0 -31
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +0 -20
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +0 -21
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +0 -27
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +0 -22
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-74616.yml +0 -18
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-77199.yml +0 -23
- data/data/ruby-advisory-db/gems/actionpack-page_caching/CVE-2020-8159.yml +0 -40
- data/data/ruby-advisory-db/gems/actionview/CVE-2016-0752.yml +0 -95
- data/data/ruby-advisory-db/gems/actionview/CVE-2016-2097.yml +0 -89
- data/data/ruby-advisory-db/gems/actionview/CVE-2016-6316.yml +0 -56
- data/data/ruby-advisory-db/gems/actionview/CVE-2019-5418.yml +0 -98
- data/data/ruby-advisory-db/gems/actionview/CVE-2019-5419.yml +0 -95
- data/data/ruby-advisory-db/gems/actionview/CVE-2020-5267.yml +0 -69
- data/data/ruby-advisory-db/gems/actionview/CVE-2020-8163.yml +0 -29
- data/data/ruby-advisory-db/gems/actionview/CVE-2020-8167.yml +0 -45
- data/data/ruby-advisory-db/gems/active-support/CVE-2018-3779.yml +0 -17
- data/data/ruby-advisory-db/gems/activejob/CVE-2018-16476.yml +0 -36
- data/data/ruby-advisory-db/gems/activemodel/CVE-2016-0753.yml +0 -95
- data/data/ruby-advisory-db/gems/activerecord/CVE-2012-2660.yml +0 -24
- data/data/ruby-advisory-db/gems/activerecord/CVE-2012-2661.yml +0 -25
- data/data/ruby-advisory-db/gems/activerecord/CVE-2013-0155.yml +0 -24
- data/data/ruby-advisory-db/gems/activerecord/CVE-2013-0276.yml +0 -21
- data/data/ruby-advisory-db/gems/activerecord/CVE-2013-0277.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/CVE-2013-1854.yml +0 -26
- data/data/ruby-advisory-db/gems/activerecord/CVE-2014-0080.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/CVE-2014-3482.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/CVE-2014-3483.yml +0 -24
- data/data/ruby-advisory-db/gems/activerecord/CVE-2014-3514.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/CVE-2015-7577.yml +0 -110
- data/data/ruby-advisory-db/gems/activerecord/CVE-2016-6317.yml +0 -73
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-88661.yml +0 -20
- data/data/ruby-advisory-db/gems/activerecord-jdbc-adapter/OSVDB-114854.yml +0 -20
- data/data/ruby-advisory-db/gems/activerecord-oracle_enhanced-adapter/OSVDB-95376.yml +0 -15
- data/data/ruby-advisory-db/gems/activeresource/CVE-2020-8151.yml +0 -48
- data/data/ruby-advisory-db/gems/activeresource/OSVDB-95749.yml +0 -15
- data/data/ruby-advisory-db/gems/activestorage/CVE-2018-16477.yml +0 -43
- data/data/ruby-advisory-db/gems/activestorage/CVE-2020-8162.yml +0 -31
- data/data/ruby-advisory-db/gems/activesupport/CVE-2012-1098.yml +0 -26
- data/data/ruby-advisory-db/gems/activesupport/CVE-2012-3464.yml +0 -23
- data/data/ruby-advisory-db/gems/activesupport/CVE-2013-0333.yml +0 -25
- data/data/ruby-advisory-db/gems/activesupport/CVE-2013-1856.yml +0 -28
- data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3226.yml +0 -55
- data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3227.yml +0 -33
- data/data/ruby-advisory-db/gems/activesupport/CVE-2020-8165.yml +0 -41
- data/data/ruby-advisory-db/gems/administrate/CVE-2016-3098.yml +0 -14
- data/data/ruby-advisory-db/gems/administrate/CVE-2020-5257.yml +0 -24
- data/data/ruby-advisory-db/gems/aescrypt/CVE-2013-7463.yml +0 -10
- data/data/ruby-advisory-db/gems/airbrake-ruby/CVE-2019-16060.yml +0 -18
- data/data/ruby-advisory-db/gems/archive-tar-minitar/CVE-2016-10173.yml +0 -16
- data/data/ruby-advisory-db/gems/as/OSVDB-112683.yml +0 -10
- data/data/ruby-advisory-db/gems/authlogic/CVE-2012-6497.yml +0 -15
- data/data/ruby-advisory-db/gems/auto_awesomplete/OSVDB-132800.yml +0 -11
- data/data/ruby-advisory-db/gems/auto_select2/OSVDB-132800.yml +0 -13
- data/data/ruby-advisory-db/gems/awesome-bot/CVE-2019-15224.yml +0 -19
- data/data/ruby-advisory-db/gems/awesome_spawn/CVE-2014-0156.yml +0 -19
- data/data/ruby-advisory-db/gems/backup-agoddard/CVE-2014-4993.yml +0 -8
- data/data/ruby-advisory-db/gems/backup_checksum/CVE-2014-4993.yml +0 -12
- data/data/ruby-advisory-db/gems/backup_checksum/OSVDB-108570.yml +0 -10
- data/data/ruby-advisory-db/gems/bcrypt/OSVDB-62067.yml +0 -17
- data/data/ruby-advisory-db/gems/bcrypt-ruby/OSVDB-62067.yml +0 -19
- data/data/ruby-advisory-db/gems/bibtex-ruby/CVE-2019-10780.yml +0 -16
- data/data/ruby-advisory-db/gems/bio-basespace-sdk/CVE-2013-7111.yml +0 -8
- data/data/ruby-advisory-db/gems/bitcoin_vanity/CVE-2019-15224.yml +0 -18
- data/data/ruby-advisory-db/gems/blockchain_wallet/CVE-2019-15224.yml +0 -19
- data/data/ruby-advisory-db/gems/bootstrap/CVE-2016-10735.yml +0 -20
- data/data/ruby-advisory-db/gems/bootstrap/CVE-2018-14040.yml +0 -24
- data/data/ruby-advisory-db/gems/bootstrap/CVE-2019-8331.yml +0 -20
- data/data/ruby-advisory-db/gems/bootstrap-sass/CVE-2016-10735.yml +0 -20
- data/data/ruby-advisory-db/gems/bootstrap-sass/CVE-2019-10842.yml +0 -25
- data/data/ruby-advisory-db/gems/bootstrap-sass/CVE-2019-8331.yml +0 -20
- data/data/ruby-advisory-db/gems/brakeman/CVE-2019-18409.yml +0 -26
- data/data/ruby-advisory-db/gems/brbackup/CVE-2014-5004.yml +0 -11
- data/data/ruby-advisory-db/gems/brbackup/OSVDB-108899.yml +0 -12
- data/data/ruby-advisory-db/gems/brbackup/OSVDB-108900.yml +0 -11
- data/data/ruby-advisory-db/gems/bson/CVE-2015-4411.yml +0 -21
- data/data/ruby-advisory-db/gems/bson/CVE-2015-4412.yml +0 -18
- data/data/ruby-advisory-db/gems/builder/OSVDB-95668.yml +0 -13
- data/data/ruby-advisory-db/gems/bundler/CVE-2013-0334.yml +0 -15
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115090.yml +0 -13
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115091.yml +0 -12
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115917.yml +0 -12
- data/data/ruby-advisory-db/gems/cairo/CVE-2017-7475.yml +0 -15
- data/data/ruby-advisory-db/gems/cap-strap/CVE-2014-4992.yml +0 -8
- data/data/ruby-advisory-db/gems/cap-strap/OSVDB-108575.yml +0 -7
- data/data/ruby-advisory-db/gems/capistrano-colors/CVE-2019-15224.yml +0 -19
- data/data/ruby-advisory-db/gems/chartkick/CVE-2019-12732.yml +0 -21
- data/data/ruby-advisory-db/gems/chartkick/CVE-2019-18841.yml +0 -13
- data/data/ruby-advisory-db/gems/chloride/CVE-2018-6517.yml +0 -17
- data/data/ruby-advisory-db/gems/ciborg/CVE-2014-5003.yml +0 -8
- data/data/ruby-advisory-db/gems/cocaine/CVE-2013-4457.yml +0 -15
- data/data/ruby-advisory-db/gems/codders-dataset/CVE-2014-4991.yml +0 -8
- data/data/ruby-advisory-db/gems/coin_base/CVE-2019-15224.yml +0 -18
- data/data/ruby-advisory-db/gems/colorscore/CVE-2015-7541.yml +0 -21
- data/data/ruby-advisory-db/gems/coming-soon/CVE-2019-15224.yml +0 -18
- data/data/ruby-advisory-db/gems/command_wrap/CVE-2013-1875.yml +0 -9
- data/data/ruby-advisory-db/gems/consul/CVE-2019-16377.yml +0 -15
- data/data/ruby-advisory-db/gems/crack/CVE-2013-1800.yml +0 -17
- data/data/ruby-advisory-db/gems/cremefraiche/CVE-2013-2090.yml +0 -11
- data/data/ruby-advisory-db/gems/cron_parser/CVE-2019-15224.yml +0 -20
- data/data/ruby-advisory-db/gems/curb/OSVDB-114600.yml +0 -12
- data/data/ruby-advisory-db/gems/curl/CVE-2013-2617.yml +0 -13
- data/data/ruby-advisory-db/gems/datagrid/CVE-2019-14281.yml +0 -14
- data/data/ruby-advisory-db/gems/delayed_job_web/CVE-2017-12097.yml +0 -17
- data/data/ruby-advisory-db/gems/devise/CVE-2013-0233.yml +0 -20
- data/data/ruby-advisory-db/gems/devise/CVE-2015-8314.yml +0 -14
- data/data/ruby-advisory-db/gems/devise/CVE-2019-16109.yml +0 -13
- data/data/ruby-advisory-db/gems/devise/CVE-2019-5421.yml +0 -16
- data/data/ruby-advisory-db/gems/devise/OSVDB-114435.yml +0 -17
- data/data/ruby-advisory-db/gems/devise-two-factor/CVE-2015-7225.yml +0 -22
- data/data/ruby-advisory-db/gems/doge-coin/CVE-2019-15224.yml +0 -19
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2014-8144.yml +0 -26
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2016-6582.yml +0 -43
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2018-1000088.yml +0 -39
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2018-1000211.yml +0 -39
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2020-10187.yml +0 -34
- data/data/ruby-advisory-db/gems/doorkeeper/OSVDB-118830.yml +0 -17
- data/data/ruby-advisory-db/gems/doorkeeper-openid_connect/CVE-2019-9837.yml +0 -16
- data/data/ruby-advisory-db/gems/dragonfly/CVE-2013-1756.yml +0 -16
- data/data/ruby-advisory-db/gems/dragonfly/CVE-2013-5671.yml +0 -14
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-110439.yml +0 -13
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-97854.yml +0 -12
- data/data/ruby-advisory-db/gems/easymon/CVE-2018-1000855.yml +0 -16
- data/data/ruby-advisory-db/gems/echor/CVE-2014-1834.yml +0 -12
- data/data/ruby-advisory-db/gems/echor/CVE-2014-1835.yml +0 -11
- data/data/ruby-advisory-db/gems/ember-source/CVE-2013-4170.yml +0 -25
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0013.yml +0 -33
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0014.yml +0 -30
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml +0 -26
- data/data/ruby-advisory-db/gems/ember-source/CVE-2015-1866.yml +0 -26
- data/data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml +0 -30
- data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +0 -9
- data/data/ruby-advisory-db/gems/espeak-ruby/CVE-2016-10193.yml +0 -15
- data/data/ruby-advisory-db/gems/excon/CVE-2019-16779.yml +0 -23
- data/data/ruby-advisory-db/gems/extlib/CVE-2013-1802.yml +0 -18
- data/data/ruby-advisory-db/gems/fastreader/CVE-2013-2615.yml +0 -13
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2013-7222.yml +0 -17
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2013-7223.yml +0 -19
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2013-7224.yml +0 -17
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2013-7225.yml +0 -19
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2013-7249.yml +0 -16
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2014-5441.yml +0 -19
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2015-1585.yml +0 -17
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2018-1000842.yml +0 -23
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2018-20975.yml +0 -12
- data/data/ruby-advisory-db/gems/faye/CVE-2020-11020.yml +0 -91
- data/data/ruby-advisory-db/gems/features/CVE-2013-4318.yml +0 -8
- data/data/ruby-advisory-db/gems/festivaltts4r/CVE-2016-10194.yml +0 -12
- data/data/ruby-advisory-db/gems/ffi/CVE-2018-1000201.yml +0 -22
- data/data/ruby-advisory-db/gems/field_test/CVE-2019-13146.yml +0 -20
- data/data/ruby-advisory-db/gems/fileutils/CVE-2013-2516.yml +0 -11
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +0 -7
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +0 -7
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90718.yml +0 -7
- data/data/ruby-advisory-db/gems/flash_tool/CVE-2013-2513.yml +0 -8
- data/data/ruby-advisory-db/gems/flavour_saver/OSVDB-110796.yml +0 -14
- data/data/ruby-advisory-db/gems/flukso4r/OSVDB-101577.yml +0 -7
- data/data/ruby-advisory-db/gems/fog-dragonfly/CVE-2013-1756.yml +0 -18
- data/data/ruby-advisory-db/gems/fog-dragonfly/CVE-2013-5671.yml +0 -16
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-110439.yml +0 -15
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-97854.yml +0 -12
- data/data/ruby-advisory-db/gems/ftpd/CVE-2013-2512.yml +0 -18
- data/data/ruby-advisory-db/gems/geminabox/CVE-2017-16792.yml +0 -21
- data/data/ruby-advisory-db/gems/gemirro/CVE-2017-16833.yml +0 -22
- data/data/ruby-advisory-db/gems/git-fastclone/CVE-2015-8968.yml +0 -21
- data/data/ruby-advisory-db/gems/git-fastclone/CVE-2015-8969.yml +0 -13
- data/data/ruby-advisory-db/gems/gitlab-grit/CVE-2013-4489.yml +0 -14
- data/data/ruby-advisory-db/gems/gnms/OSVDB-108594.yml +0 -7
- data/data/ruby-advisory-db/gems/gollum/CVE-2015-7314.yml +0 -13
- data/data/ruby-advisory-db/gems/gollum-grit_adapter/CVE-2014-9489.yml +0 -23
- data/data/ruby-advisory-db/gems/grape/CVE-2018-3769.yml +0 -20
- data/data/ruby-advisory-db/gems/gtk2/CVE-2007-6183.yml +0 -20
- data/data/ruby-advisory-db/gems/gyazo/CVE-2014-4994.yml +0 -10
- data/data/ruby-advisory-db/gems/haml/CVE-2017-1002201.yml +0 -19
- data/data/ruby-advisory-db/gems/handlebars-source/OSVDB-131671.yml +0 -17
- data/data/ruby-advisory-db/gems/http/CVE-2015-1828.yml +0 -14
- data/data/ruby-advisory-db/gems/httparty/CVE-2013-1801.yml +0 -14
- data/data/ruby-advisory-db/gems/i18n/CVE-2014-10077.yml +0 -18
- data/data/ruby-advisory-db/gems/i18n/OSVDB-100528.yml +0 -17
- data/data/ruby-advisory-db/gems/iodine/GHSA-85rf-xh54-whp3.yml +0 -21
- data/data/ruby-advisory-db/gems/jekyll/CVE-2018-17567.yml +0 -14
- data/data/ruby-advisory-db/gems/jquery-rails/CVE-2015-1840.yml +0 -36
- data/data/ruby-advisory-db/gems/jquery-rails/CVE-2019-11358.yml +0 -24
- data/data/ruby-advisory-db/gems/jquery-ui-rails/CVE-2016-7103.yml +0 -23
- data/data/ruby-advisory-db/gems/jquery-ujs/CVE-2015-1840.yml +0 -35
- data/data/ruby-advisory-db/gems/jruby-openssl/CVE-2009-4123.yml +0 -16
- data/data/ruby-advisory-db/gems/jruby-sandbox/OSVDB-106279.yml +0 -12
- data/data/ruby-advisory-db/gems/json/CVE-2013-0269.yml +0 -20
- data/data/ruby-advisory-db/gems/json/CVE-2020-10663.yml +0 -35
- data/data/ruby-advisory-db/gems/json/OSVDB-101157.yml +0 -14
- data/data/ruby-advisory-db/gems/json-jwt/CVE-2018-1000539.yml +0 -21
- data/data/ruby-advisory-db/gems/json-jwt/CVE-2019-18848.yml +0 -15
- data/data/ruby-advisory-db/gems/kafo/CVE-2014-0135.yml +0 -15
- data/data/ruby-advisory-db/gems/kajam/CVE-2014-4999.yml +0 -12
- data/data/ruby-advisory-db/gems/kajam/OSVDB-108530.yml +0 -11
- data/data/ruby-advisory-db/gems/kaminari/CVE-2020-11082.yml +0 -34
- data/data/ruby-advisory-db/gems/karo/OSVDB-108573.yml +0 -10
- data/data/ruby-advisory-db/gems/karteek-docsplit/CVE-2013-1933.yml +0 -9
- data/data/ruby-advisory-db/gems/kcapifony/CVE-2014-5001.yml +0 -8
- data/data/ruby-advisory-db/gems/kcapifony/OSVDB-108572.yml +0 -7
- data/data/ruby-advisory-db/gems/kelredd-pruview/CVE-2013-1947.yml +0 -9
- data/data/ruby-advisory-db/gems/kompanee-recipes/OSVDB-108593.yml +0 -12
- data/data/ruby-advisory-db/gems/lawn-login/CVE-2014-5000.yml +0 -8
- data/data/ruby-advisory-db/gems/ldap_fluff/CVE-2012-5604.yml +0 -15
- data/data/ruby-advisory-db/gems/ldoce/CVE-2013-1911.yml +0 -9
- data/data/ruby-advisory-db/gems/lean-ruport/CVE-2014-4998.yml +0 -8
- data/data/ruby-advisory-db/gems/lingq/OSVDB-108585.yml +0 -7
- data/data/ruby-advisory-db/gems/lita_coin/CVE-2019-15224.yml +0 -18
- data/data/ruby-advisory-db/gems/loofah/CVE-2018-16468.yml +0 -16
- data/data/ruby-advisory-db/gems/loofah/CVE-2018-8048.yml +0 -11
- data/data/ruby-advisory-db/gems/loofah/CVE-2019-15587.yml +0 -13
- data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +0 -21
- data/data/ruby-advisory-db/gems/lynx/CVE-2014-5002.yml +0 -11
- data/data/ruby-advisory-db/gems/lynx/OSVDB-108579.yml +0 -7
- data/data/ruby-advisory-db/gems/mail/CVE-2011-0739.yml +0 -21
- data/data/ruby-advisory-db/gems/mail/CVE-2012-2139.yml +0 -14
- data/data/ruby-advisory-db/gems/mail/CVE-2012-2140.yml +0 -16
- data/data/ruby-advisory-db/gems/mail/CVE-2015-9097.yml +0 -26
- data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml +0 -25
- data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-132871.yml +0 -26
- data/data/ruby-advisory-db/gems/marginalia/CVE-2019-1010191.yml +0 -17
- data/data/ruby-advisory-db/gems/matestack-ui-core/CVE-2020-5241.yml +0 -18
- data/data/ruby-advisory-db/gems/md2pdf/CVE-2013-1948.yml +0 -9
- data/data/ruby-advisory-db/gems/mini_magick/CVE-2013-2616.yml +0 -15
- data/data/ruby-advisory-db/gems/mini_magick/CVE-2019-13574.yml +0 -14
- data/data/ruby-advisory-db/gems/minitar/CVE-2016-10173.yml +0 -20
- data/data/ruby-advisory-db/gems/moped/CVE-2015-4410.yml +0 -17
- data/data/ruby-advisory-db/gems/multi_xml/CVE-2013-0175.yml +0 -16
- data/data/ruby-advisory-db/gems/mustache-js-rails/OSVDB-131671.yml +0 -17
- data/data/ruby-advisory-db/gems/mysql-binuuid-rails/CVE-2018-18476.yml +0 -21
- data/data/ruby-advisory-db/gems/net-ldap/CVE-2014-0083.yml +0 -14
- data/data/ruby-advisory-db/gems/net-ldap/CVE-2017-17718.yml +0 -17
- data/data/ruby-advisory-db/gems/netaddr/CVE-2019-17383.yml +0 -13
- data/data/ruby-advisory-db/gems/newrelic_rpm/CVE-2013-0284.yml +0 -17
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2012-6685.yml +0 -15
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2013-6460.yml +0 -18
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2013-6461.yml +0 -15
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-1819.yml +0 -52
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-5312.yml +0 -92
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml +0 -37
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-8806.yml +0 -42
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2016-4658.yml +0 -33
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2017-15412.yml +0 -23
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2017-16932.yml +0 -21
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2017-5029.yml +0 -44
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2017-9050.yml +0 -60
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2018-14404.yml +0 -69
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2018-8048.yml +0 -36
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2019-11068.yml +0 -49
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2019-13117.yml +0 -80
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2019-5477.yml +0 -31
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2020-7595.yml +0 -20
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-118481.yml +0 -15
- data/data/ruby-advisory-db/gems/nori/CVE-2013-0285.yml +0 -19
- data/data/ruby-advisory-db/gems/omniauth/CVE-2015-9284.yml +0 -25
- data/data/ruby-advisory-db/gems/omniauth/CVE-2017-18076.yml +0 -18
- data/data/ruby-advisory-db/gems/omniauth-facebook/CVE-2013-4562.yml +0 -22
- data/data/ruby-advisory-db/gems/omniauth-facebook/CVE-2013-4593.yml +0 -17
- data/data/ruby-advisory-db/gems/omniauth-oauth2/CVE-2012-6134.yml +0 -16
- data/data/ruby-advisory-db/gems/omniauth-saml/CVE-2017-11430.yml +0 -17
- data/data/ruby-advisory-db/gems/omniauth_amazon/CVE-2019-15224.yml +0 -19
- data/data/ruby-advisory-db/gems/open-uri-cached/OSVDB-121701.yml +0 -13
- data/data/ruby-advisory-db/gems/openssl/CVE-2016-7798.yml +0 -16
- data/data/ruby-advisory-db/gems/ox/CVE-2017-15928.yml +0 -16
- data/data/ruby-advisory-db/gems/ox/CVE-2017-16229.yml +0 -16
- data/data/ruby-advisory-db/gems/padrino-contrib/CVE-2019-16145.yml +0 -11
- data/data/ruby-advisory-db/gems/paperclip/CVE-2015-2963.yml +0 -16
- data/data/ruby-advisory-db/gems/paperclip/CVE-2017-0889.yml +0 -23
- data/data/ruby-advisory-db/gems/paperclip/OSVDB-103151.yml +0 -13
- data/data/ruby-advisory-db/gems/paranoid2/CVE-2019-13589.yml +0 -16
- data/data/ruby-advisory-db/gems/paratrooper-newrelic/CVE-2014-1234.yml +0 -13
- data/data/ruby-advisory-db/gems/paratrooper-pingdom/CVE-2014-1233.yml +0 -13
- data/data/ruby-advisory-db/gems/passenger/CVE-2013-2119.yml +0 -15
- data/data/ruby-advisory-db/gems/passenger/CVE-2013-4136.yml +0 -14
- data/data/ruby-advisory-db/gems/passenger/CVE-2014-1831.yml +0 -13
- data/data/ruby-advisory-db/gems/passenger/CVE-2014-1832.yml +0 -13
- data/data/ruby-advisory-db/gems/passenger/CVE-2015-7519.yml +0 -17
- data/data/ruby-advisory-db/gems/passenger/CVE-2016-10345.yml +0 -17
- data/data/ruby-advisory-db/gems/passenger/OSVDB-90738.yml +0 -16
- data/data/ruby-advisory-db/gems/pdfkit/CVE-2013-1607.yml +0 -11
- data/data/ruby-advisory-db/gems/point-cli/CVE-2014-4997.yml +0 -8
- data/data/ruby-advisory-db/gems/private_address_check/CVE-2017-0904.yml +0 -17
- data/data/ruby-advisory-db/gems/private_address_check/CVE-2017-0909.yml +0 -15
- data/data/ruby-advisory-db/gems/private_address_check/CVE-2018-3759.yml +0 -14
- data/data/ruby-advisory-db/gems/puma/CVE-2019-16770.yml +0 -21
- data/data/ruby-advisory-db/gems/puma/CVE-2020-11076.yml +0 -22
- data/data/ruby-advisory-db/gems/puma/CVE-2020-11077.yml +0 -31
- data/data/ruby-advisory-db/gems/puma/CVE-2020-5247.yml +0 -25
- data/data/ruby-advisory-db/gems/puma/CVE-2020-5249.yml +0 -36
- data/data/ruby-advisory-db/gems/quick_magick/OSVDB-106954.yml +0 -7
- data/data/ruby-advisory-db/gems/rack/CVE-2011-5036.yml +0 -21
- data/data/ruby-advisory-db/gems/rack/CVE-2012-6109.yml +0 -21
- data/data/ruby-advisory-db/gems/rack/CVE-2013-0183.yml +0 -19
- data/data/ruby-advisory-db/gems/rack/CVE-2013-0184.yml +0 -20
- data/data/ruby-advisory-db/gems/rack/CVE-2013-0262.yml +0 -18
- data/data/ruby-advisory-db/gems/rack/CVE-2013-0263.yml +0 -23
- data/data/ruby-advisory-db/gems/rack/CVE-2015-3225.yml +0 -18
- data/data/ruby-advisory-db/gems/rack/CVE-2018-16470.yml +0 -56
- data/data/ruby-advisory-db/gems/rack/CVE-2018-16471.yml +0 -80
- data/data/ruby-advisory-db/gems/rack/CVE-2019-16782.yml +0 -32
- data/data/ruby-advisory-db/gems/rack/CVE-2020-8161.yml +0 -32
- data/data/ruby-advisory-db/gems/rack-attack/OSVDB-132234.yml +0 -26
- data/data/ruby-advisory-db/gems/rack-cache/CVE-2012-2671.yml +0 -18
- data/data/ruby-advisory-db/gems/rack-cors/CVE-2017-11173.yml +0 -21
- data/data/ruby-advisory-db/gems/rack-cors/CVE-2019-18978.yml +0 -13
- data/data/ruby-advisory-db/gems/rack-mini-profiler/CVE-2016-4442.yml +0 -17
- data/data/ruby-advisory-db/gems/rack-protection/CVE-2018-1000119.yml +0 -18
- data/data/ruby-advisory-db/gems/rack-protection/CVE-2018-7212.yml +0 -12
- data/data/ruby-advisory-db/gems/rack-ssl/CVE-2014-2538.yml +0 -11
- data/data/ruby-advisory-db/gems/radiant/CVE-2018-5216.yml +0 -12
- data/data/ruby-advisory-db/gems/radiant/CVE-2018-7261.yml +0 -13
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7578.yml +0 -47
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7579.yml +0 -75
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7580.yml +0 -70
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2018-3741.yml +0 -20
- data/data/ruby-advisory-db/gems/rails_admin/CVE-2016-10522.yml +0 -21
- data/data/ruby-advisory-db/gems/rails_admin/CVE-2017-12098.yml +0 -22
- data/data/ruby-advisory-db/gems/railties/CVE-2019-5420.yml +0 -49
- data/data/ruby-advisory-db/gems/rake/CVE-2020-8130.yml +0 -18
- data/data/ruby-advisory-db/gems/rbovirt/CVE-2014-0036.yml +0 -20
- data/data/ruby-advisory-db/gems/rdoc/CVE-2013-0256.yml +0 -27
- data/data/ruby-advisory-db/gems/recurly/CVE-2017-0905.yml +0 -35
- data/data/ruby-advisory-db/gems/redcarpet/CVE-2015-5147.yml +0 -17
- data/data/ruby-advisory-db/gems/redcarpet/OSVDB-120415.yml +0 -16
- data/data/ruby-advisory-db/gems/redis-namespace/OSVDB-96425.yml +0 -15
- data/data/ruby-advisory-db/gems/redis-store/CVE-2017-1000248.yml +0 -17
- data/data/ruby-advisory-db/gems/refile/OSVDB-120857.yml +0 -16
- data/data/ruby-advisory-db/gems/rest-client/CVE-2015-1820.yml +0 -23
- data/data/ruby-advisory-db/gems/rest-client/CVE-2015-3448.yml +0 -15
- data/data/ruby-advisory-db/gems/rest-client/CVE-2019-15224.yml +0 -13
- data/data/ruby-advisory-db/gems/restforce/CVE-2018-3777.yml +0 -36
- data/data/ruby-advisory-db/gems/rexical/CVE-2019-5477.yml +0 -21
- data/data/ruby-advisory-db/gems/rgpg/CVE-2013-4203.yml +0 -15
- data/data/ruby-advisory-db/gems/rubocop/CVE-2017-8418.yml +0 -20
- data/data/ruby-advisory-db/gems/ruby-openid/CVE-2019-11027.yml +0 -16
- data/data/ruby-advisory-db/gems/ruby-saml/CVE-2016-5697.yml +0 -20
- data/data/ruby-advisory-db/gems/ruby-saml/CVE-2017-11428.yml +0 -27
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-117903.yml +0 -13
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124383.yml +0 -11
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124991.yml +0 -13
- data/data/ruby-advisory-db/gems/ruby_parser/CVE-2013-0162.yml +0 -11
- data/data/ruby-advisory-db/gems/ruby_parser-legacy/CVE-2019-18409.yml +0 -16
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2007-0469.yml +0 -18
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2012-2125.yml +0 -17
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2012-2126.yml +0 -15
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2013-4287.yml +0 -20
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2013-4363.yml +0 -21
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2015-3900.yml +0 -20
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2015-4020.yml +0 -20
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2017-0899.yml +0 -16
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2017-0900.yml +0 -16
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2017-0901.yml +0 -16
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2017-0902.yml +0 -16
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2017-0903.yml +0 -17
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8320.yml +0 -21
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8321.yml +0 -16
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8322.yml +0 -16
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8323.yml +0 -17
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8324.yml +0 -18
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8325.yml +0 -16
- data/data/ruby-advisory-db/gems/rubyzip/CVE-2017-5946.yml +0 -17
- data/data/ruby-advisory-db/gems/rubyzip/CVE-2018-1000544.yml +0 -19
- data/data/ruby-advisory-db/gems/rubyzip/CVE-2019-16892.yml +0 -13
- data/data/ruby-advisory-db/gems/safemode/CVE-2016-3693.yml +0 -13
- data/data/ruby-advisory-db/gems/safemode/CVE-2017-7540.yml +0 -16
- data/data/ruby-advisory-db/gems/samlr/CVE-2018-20857.yml +0 -16
- data/data/ruby-advisory-db/gems/sanitize/CVE-2018-3740.yml +0 -22
- data/data/ruby-advisory-db/gems/screen_capture/OSVDB-107783.yml +0 -7
- data/data/ruby-advisory-db/gems/secure_headers/CVE-2020-5216.yml +0 -52
- data/data/ruby-advisory-db/gems/secure_headers/CVE-2020-5217.yml +0 -42
- data/data/ruby-advisory-db/gems/sentry-raven/CVE-2014-9490.yml +0 -14
- data/data/ruby-advisory-db/gems/sfpagent/CVE-2014-2888.yml +0 -15
- data/data/ruby-advisory-db/gems/show_in_browser/CVE-2013-2105.yml +0 -8
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125675.yml +0 -9
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125676.yml +0 -14
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125678.yml +0 -9
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126329.yml +0 -12
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126330.yml +0 -10
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126331.yml +0 -14
- data/data/ruby-advisory-db/gems/simple_captcha2/CVE-2019-14282.yml +0 -13
- data/data/ruby-advisory-db/gems/simple_form/CVE-2019-16676.yml +0 -15
- data/data/ruby-advisory-db/gems/sinatra/CVE-2018-11627.yml +0 -16
- data/data/ruby-advisory-db/gems/sinatra/CVE-2018-7212.yml +0 -19
- data/data/ruby-advisory-db/gems/slanger/CVE-2019-1010306.yml +0 -16
- data/data/ruby-advisory-db/gems/smart_proxy_dynflow/CVE-2018-14643.yml +0 -18
- data/data/ruby-advisory-db/gems/sorcery/CVE-2020-11052.yml +0 -27
- data/data/ruby-advisory-db/gems/sounder/CVE-2013-5647.yml +0 -14
- data/data/ruby-advisory-db/gems/spina/CVE-2015-4619.yml +0 -16
- data/data/ruby-advisory-db/gems/spree/OSVDB-119205.yml +0 -18
- data/data/ruby-advisory-db/gems/spree/OSVDB-125699.yml +0 -18
- data/data/ruby-advisory-db/gems/spree/OSVDB-125701.yml +0 -17
- data/data/ruby-advisory-db/gems/spree/OSVDB-125712.yml +0 -16
- data/data/ruby-advisory-db/gems/spree/OSVDB-125713.yml +0 -15
- data/data/ruby-advisory-db/gems/spree/OSVDB-69098.yml +0 -19
- data/data/ruby-advisory-db/gems/spree/OSVDB-73751.yml +0 -11
- data/data/ruby-advisory-db/gems/spree/OSVDB-76011.yml +0 -15
- data/data/ruby-advisory-db/gems/spree/OSVDB-81505.yml +0 -14
- data/data/ruby-advisory-db/gems/spree/OSVDB-81506.yml +0 -16
- data/data/ruby-advisory-db/gems/spree/OSVDB-90865.yml +0 -20
- data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +0 -17
- data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +0 -17
- data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +0 -17
- data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +0 -17
- data/data/ruby-advisory-db/gems/spree_auth/OSVDB-90865.yml +0 -16
- data/data/ruby-advisory-db/gems/spree_auth_devise/OSVDB-90865.yml +0 -20
- data/data/ruby-advisory-db/gems/sprockets/CVE-2014-7819.yml +0 -27
- data/data/ruby-advisory-db/gems/sprockets/CVE-2018-3760.yml +0 -23
- data/data/ruby-advisory-db/gems/sprout/CVE-2013-6421.yml +0 -16
- data/data/ruby-advisory-db/gems/strong_password/CVE-2019-13354.yml +0 -19
- data/data/ruby-advisory-db/gems/sup/CVE-2013-4478.yml +0 -14
- data/data/ruby-advisory-db/gems/sup/CVE-2013-4479.yml +0 -14
- data/data/ruby-advisory-db/gems/thumbshooter/CVE-2013-1898.yml +0 -9
- data/data/ruby-advisory-db/gems/twitter-bootstrap-rails/OSVDB-109206.yml +0 -22
- data/data/ruby-advisory-db/gems/uglifier/OSVDB-126747.yml +0 -19
- data/data/ruby-advisory-db/gems/user_agent_parser/CVE-2020-5243.yml +0 -28
- data/data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml +0 -22
- data/data/ruby-advisory-db/gems/web-console/OSVDB-112346.yml +0 -12
- data/data/ruby-advisory-db/gems/webbynode/CVE-2013-7086.yml +0 -12
- data/data/ruby-advisory-db/gems/websocket-extensions/CVE-2020-7663.yml +0 -35
- data/data/ruby-advisory-db/gems/wicked/CVE-2013-4413.yml +0 -14
- data/data/ruby-advisory-db/gems/will_paginate/CVE-2013-6459.yml +0 -15
- data/data/ruby-advisory-db/gems/xaviershay-dm-rails/CVE-2015-2179.yml +0 -13
- data/data/ruby-advisory-db/gems/yajl-ruby/CVE-2017-16516.yml +0 -19
- data/data/ruby-advisory-db/gems/yard/CVE-2017-17042.yml +0 -16
- data/data/ruby-advisory-db/gems/yard/CVE-2019-1020001.yml +0 -17
- data/data/ruby-advisory-db/gems/yard/GHSA-xfhh-rx56-rxcr.yml +0 -12
- data/data/ruby-advisory-db/lib/cf_scrape.py +0 -5
- data/data/ruby-advisory-db/lib/github_advisory_sync.rb +0 -296
- data/data/ruby-advisory-db/libraries/rubygems +0 -1
- data/data/ruby-advisory-db/rubies/jruby/CVE-2010-1330.yml +0 -17
- data/data/ruby-advisory-db/rubies/jruby/CVE-2011-4838.yml +0 -15
- data/data/ruby-advisory-db/rubies/jruby/CVE-2012-5370.yml +0 -17
- data/data/ruby-advisory-db/rubies/jruby/OSVDB-94644.yml +0 -12
- data/data/ruby-advisory-db/rubies/rbx/CVE-2012-5372.yml +0 -17
- data/data/ruby-advisory-db/rubies/rbx/OSVDB-78119.yml +0 -13
- data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5162.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5770.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1447.yml +0 -15
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1891.yml +0 -21
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2376.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2662.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2663.yml +0 -21
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2664.yml +0 -21
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2725.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2726.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3443.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3655.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3656.yml +0 -19
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3657.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3790.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3905.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-0642.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-1904.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-4124.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-4492.yml +0 -20
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-5147.yml +0 -13
- data/data/ruby-advisory-db/rubies/ruby/CVE-2010-0541.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2010-2489.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-0188.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-1004.yml +0 -20
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-1005.yml +0 -15
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2705.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-3009.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-3389.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-4815.yml +0 -14
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4464.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4466.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4481.yml +0 -15
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4522.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-5371.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/CVE-2013-1821.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2013-2065.yml +0 -19
- data/data/ruby-advisory-db/rubies/ruby/CVE-2013-4073.yml +0 -21
- data/data/ruby-advisory-db/rubies/ruby/CVE-2013-4164.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2014-2525.yml +0 -20
- data/data/ruby-advisory-db/rubies/ruby/CVE-2014-3916.yml +0 -16
- data/data/ruby-advisory-db/rubies/ruby/CVE-2014-4975.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2014-8080.yml +0 -19
- data/data/ruby-advisory-db/rubies/ruby/CVE-2014-8090.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/CVE-2015-1855.yml +0 -17
- data/data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml +0 -19
- data/data/ruby-advisory-db/rubies/ruby/CVE-2015-9096.yml +0 -20
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-0898.yml +0 -19
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-10784.yml +0 -25
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-14033.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-14064.yml +0 -20
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-17405.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-17742.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-16395.yml +0 -36
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-16396.yml +0 -26
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-6914.yml +0 -27
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-8777.yml +0 -21
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-8778.yml +0 -20
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-8779.yml +0 -28
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-8780.yml +0 -22
- data/data/ruby-advisory-db/rubies/ruby/CVE-2019-15845.yml +0 -18
- data/data/ruby-advisory-db/rubies/ruby/CVE-2019-16201.yml +0 -15
- data/data/ruby-advisory-db/rubies/ruby/CVE-2019-16254.yml +0 -19
- data/data/ruby-advisory-db/rubies/ruby/CVE-2019-16255.yml +0 -20
- data/data/ruby-advisory-db/rubies/ruby/CVE-2020-10663.yml +0 -29
- data/data/ruby-advisory-db/rubies/ruby/CVE-2020-10933.yml +0 -25
- data/data/ruby-advisory-db/scripts/post-advisories.sh +0 -18
- data/data/ruby-advisory-db/spec/advisories_spec.rb +0 -23
- data/data/ruby-advisory-db/spec/advisory_example.rb +0 -228
- data/data/ruby-advisory-db/spec/gem_example.rb +0 -44
- data/data/ruby-advisory-db/spec/library_example.rb +0 -21
- data/data/ruby-advisory-db/spec/ruby_example.rb +0 -29
- data/data/ruby-advisory-db/spec/schemas/gem.yml +0 -71
- data/data/ruby-advisory-db/spec/schemas/ruby.yml +0 -36
- data/data/ruby-advisory-db/spec/spec_helper.rb +0 -2
- data/data/ruby-advisory-db.ts +0 -1
@@ -1,110 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activerecord
|
3
|
-
framework: rails
|
4
|
-
cve: 2015-7577
|
5
|
-
date: 2016-01-25
|
6
|
-
url: https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g
|
7
|
-
|
8
|
-
title: Nested attributes rejection proc bypass in Active Record
|
9
|
-
|
10
|
-
description: |
|
11
|
-
There is a vulnerability in how the nested attributes feature in Active Record
|
12
|
-
handles updates in combination with destroy flags when destroying records is
|
13
|
-
disabled. This vulnerability has been assigned the CVE identifier CVE-2015-7577.
|
14
|
-
|
15
|
-
Versions Affected: 3.1.0 and newer
|
16
|
-
Not affected: 3.0.x and older
|
17
|
-
Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
|
18
|
-
|
19
|
-
Impact
|
20
|
-
------
|
21
|
-
When using the nested attributes feature in Active Record you can prevent the
|
22
|
-
destruction of associated records by passing the `allow_destroy: false` option
|
23
|
-
to the `accepts_nested_attributes_for` method. However due to a change in the
|
24
|
-
commit [a9b4b5d][1] the `_destroy` flag prevents the `:reject_if` proc from
|
25
|
-
being called because it assumes that the record will be destroyed anyway.
|
26
|
-
|
27
|
-
However this isn't true if `:allow_destroy` is false so this leads to changes
|
28
|
-
that would have been rejected being applied to the record. Attackers could use
|
29
|
-
this do things like set attributes to invalid values and to clear all of the
|
30
|
-
attributes amongst other things. The severity will be dependent on how the
|
31
|
-
application has used this feature.
|
32
|
-
|
33
|
-
All users running an affected release should either upgrade or use one of
|
34
|
-
the workarounds immediately.
|
35
|
-
|
36
|
-
Releases
|
37
|
-
--------
|
38
|
-
The FIXED releases are available at the normal locations.
|
39
|
-
|
40
|
-
Workarounds
|
41
|
-
-----------
|
42
|
-
If you can't upgrade, please use the following monkey patch in an initializer
|
43
|
-
that is loaded before your application:
|
44
|
-
|
45
|
-
```
|
46
|
-
$ cat config/initializers/nested_attributes_bypass_fix.rb
|
47
|
-
module ActiveRecord
|
48
|
-
module NestedAttributes
|
49
|
-
private
|
50
|
-
|
51
|
-
def reject_new_record?(association_name, attributes)
|
52
|
-
will_be_destroyed?(association_name, attributes) || call_reject_if(association_name, attributes)
|
53
|
-
end
|
54
|
-
|
55
|
-
def call_reject_if(association_name, attributes)
|
56
|
-
return false if will_be_destroyed?(association_name, attributes)
|
57
|
-
|
58
|
-
case callback = self.nested_attributes_options[association_name][:reject_if]
|
59
|
-
when Symbol
|
60
|
-
method(callback).arity == 0 ? send(callback) : send(callback, attributes)
|
61
|
-
when Proc
|
62
|
-
callback.call(attributes)
|
63
|
-
end
|
64
|
-
end
|
65
|
-
|
66
|
-
def will_be_destroyed?(association_name, attributes)
|
67
|
-
allow_destroy?(association_name) && has_destroy_flag?(attributes)
|
68
|
-
end
|
69
|
-
|
70
|
-
def allow_destroy?(association_name)
|
71
|
-
self.nested_attributes_options[association_name][:allow_destroy]
|
72
|
-
end
|
73
|
-
end
|
74
|
-
end
|
75
|
-
```
|
76
|
-
|
77
|
-
Patches
|
78
|
-
-------
|
79
|
-
To aid users who aren't able to upgrade immediately we have provided patches for
|
80
|
-
the two supported release series. They are in git-am format and consist of a
|
81
|
-
single changeset.
|
82
|
-
|
83
|
-
* 3-2-nested-attributes-reject-if-bypass.patch - Patch for 3.2 series
|
84
|
-
* 4-1-nested-attributes-reject-if-bypass.patch - Patch for 4.1 series
|
85
|
-
* 4-2-nested-attributes-reject-if-bypass.patch - Patch for 4.2 series
|
86
|
-
* 5-0-nested-attributes-reject-if-bypass.patch - Patch for 5.0 series
|
87
|
-
|
88
|
-
Please note that only the 4.1.x and 4.2.x series are supported at present. Users
|
89
|
-
of earlier unsupported releases are advised to upgrade as soon as possible as we
|
90
|
-
cannot guarantee the continued availability of security fixes for unsupported
|
91
|
-
releases.
|
92
|
-
|
93
|
-
Credits
|
94
|
-
-------
|
95
|
-
Thank you to Justin Coyne for reporting the problem and working with us to fix it.
|
96
|
-
|
97
|
-
[1]: https://github.com/rails/rails/commit/a9b4b5da7c216e4464eeb9dbd0a39ea258d64325
|
98
|
-
|
99
|
-
cvss_v2: 5.0
|
100
|
-
cvss_v3: 5.3
|
101
|
-
|
102
|
-
unaffected_versions:
|
103
|
-
- "~> 3.0.0"
|
104
|
-
- "< 3.0.0"
|
105
|
-
|
106
|
-
patched_versions:
|
107
|
-
- ">= 5.0.0.beta1.1"
|
108
|
-
- "~> 4.2.5, >= 4.2.5.1"
|
109
|
-
- "~> 4.1.14, >= 4.1.14.1"
|
110
|
-
- "~> 3.2.22.1"
|
@@ -1,73 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activerecord
|
3
|
-
framework: rails
|
4
|
-
cve: 2016-6317
|
5
|
-
date: 2016-08-11
|
6
|
-
url: https://groups.google.com/forum/#!topic/rubyonrails-security/rgO20zYW33s
|
7
|
-
|
8
|
-
title: Unsafe Query Generation Risk in Active Record
|
9
|
-
|
10
|
-
description: |
|
11
|
-
There is a vulnerability when Active Record is used in conjunction with JSON
|
12
|
-
parameter parsing. This vulnerability is similar to CVE-2012-2660,
|
13
|
-
CVE-2012-2694 and CVE-2013-0155.
|
14
|
-
|
15
|
-
Impact
|
16
|
-
------
|
17
|
-
|
18
|
-
Due to the way Active Record interprets parameters in combination with the way
|
19
|
-
that JSON parameters are parsed, it is possible for an attacker to issue
|
20
|
-
unexpected database queries with "IS NULL" or empty where clauses. This issue
|
21
|
-
does *not* let an attacker insert arbitrary values into an SQL query, however
|
22
|
-
they can cause the query to check for NULL or eliminate a WHERE clause when
|
23
|
-
most users wouldn't expect it.
|
24
|
-
|
25
|
-
For example, a system has password reset with token functionality:
|
26
|
-
|
27
|
-
```ruby
|
28
|
-
unless params[:token].nil?
|
29
|
-
user = User.find_by_token(params[:token])
|
30
|
-
user.reset_password!
|
31
|
-
end
|
32
|
-
```
|
33
|
-
|
34
|
-
An attacker can craft a request such that `params[:token]` will return
|
35
|
-
`[nil]`. The `[nil]` value will bypass the test for nil, but will still add
|
36
|
-
an "IN ('xyz', NULL)" clause to the SQL query.
|
37
|
-
|
38
|
-
Similarly, an attacker can craft a request such that `params[:token]` will
|
39
|
-
return an empty hash. An empty hash will eliminate the WHERE clause of the
|
40
|
-
query, but can bypass the `nil?` check.
|
41
|
-
|
42
|
-
Note that this impacts not only dynamic finders (`find_by_*`) but also
|
43
|
-
relations (`User.where(:name => params[:name])`).
|
44
|
-
|
45
|
-
All users running an affected release should either upgrade or use one of the
|
46
|
-
work arounds immediately. All users running an affected release should upgrade
|
47
|
-
immediately. Please note, this vulnerability is a variant of CVE-2012-2660,
|
48
|
-
CVE-2012-2694, and CVE-2013-0155. Even if you upgraded to address those
|
49
|
-
issues, you must take action again.
|
50
|
-
|
51
|
-
If this chance in behavior impacts your application, you can manually decode
|
52
|
-
the original values from the request like so:
|
53
|
-
|
54
|
-
`ActiveSupport::JSON.decode(request.body)`
|
55
|
-
|
56
|
-
Workarounds
|
57
|
-
-----------
|
58
|
-
This problem can be mitigated by casting the parameter to a string before
|
59
|
-
passing it to Active Record. For example:
|
60
|
-
|
61
|
-
```ruby
|
62
|
-
unless params[:token].nil? || params[:token].to_s.empty?
|
63
|
-
user = User.find_by_token(params[:token].to_s)
|
64
|
-
user.reset_password!
|
65
|
-
end
|
66
|
-
```
|
67
|
-
|
68
|
-
unaffected_versions:
|
69
|
-
- "< 4.2.0"
|
70
|
-
- ">= 5.0.0"
|
71
|
-
|
72
|
-
patched_versions:
|
73
|
-
- ">= 4.2.7.1"
|
@@ -1,20 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activerecord
|
3
|
-
framework: rails
|
4
|
-
cve: 2012-6496
|
5
|
-
osvdb: 88661
|
6
|
-
url: https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/DCNTNp_qjFM
|
7
|
-
title: Ruby on Rails find_by_* Methods Authlogic SQL Injection Bypass
|
8
|
-
date: 2012-12-22
|
9
|
-
|
10
|
-
description: |
|
11
|
-
Due to the way dynamic finders in Active Record extract options from method
|
12
|
-
parameters, a method parameter can mistakenly be used as a scope. Carefully
|
13
|
-
crafted requests can use the scope to inject arbitrary SQL.
|
14
|
-
|
15
|
-
cvss_v2: 6.4
|
16
|
-
|
17
|
-
patched_versions:
|
18
|
-
- ~> 3.0.18
|
19
|
-
- ~> 3.1.9
|
20
|
-
- ">= 3.2.10"
|
@@ -1,20 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activerecord-jdbc-adapter
|
3
|
-
platform: jruby
|
4
|
-
osvdb: 114854
|
5
|
-
url: http://osvdb.org/show/osvdb/114854
|
6
|
-
title: |
|
7
|
-
ActiveRecord-JDBC-Adapter (AR-JDBC) lib/arjdbc/jdbc/adapter.rb sql.gsub()
|
8
|
-
Function SQL Injection
|
9
|
-
date: 2013-02-25
|
10
|
-
description: |
|
11
|
-
ActiveRecord-JDBC-Adapter (AR-JDBC) contains a flaw that may allow carrying
|
12
|
-
out an SQL injection attack. The issue is due to the sql.gsub() function in
|
13
|
-
lib/arjdbc/jdbc/adapter.rb not properly sanitizing user-supplied input before
|
14
|
-
using it in SQL queries. This may allow a remote attacker to inject or
|
15
|
-
manipulate SQL queries in the back-end database, allowing for the
|
16
|
-
manipulation or disclosure of arbitrary data.
|
17
|
-
unaffected_versions:
|
18
|
-
- "< 1.2.6"
|
19
|
-
patched_versions:
|
20
|
-
- ">= 1.2.8"
|
@@ -1,15 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activerecord-oracle_enhanced-adapter
|
3
|
-
osvdb: 95376
|
4
|
-
url: http://osvdb.org/show/osvdb/95376
|
5
|
-
title: Oracle "enhanced" ActiveRecord Gem for Ruby :limit / :offset SQL Injection
|
6
|
-
date: 2008-10-10
|
7
|
-
description: |
|
8
|
-
Oracle "enhanced" ActiveRecord Gem for Ruby contains a flaw that may allow an
|
9
|
-
attacker to carry out an SQL injection attack. The issue is due to the
|
10
|
-
program not properly sanitizing user-supplied input related to the :limit and
|
11
|
-
:offset functions. This may allow an attacker to inject or manipulate SQL
|
12
|
-
queries in the back-end database, allowing for the manipulation or disclosure
|
13
|
-
of arbitrary data.
|
14
|
-
patched_versions:
|
15
|
-
- ">= 1.1.8"
|
@@ -1,48 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activeresource
|
3
|
-
cve: 2020-8151
|
4
|
-
url: https://groups.google.com/forum/#!topic/rubyonrails-security/pktoF4VmiM8
|
5
|
-
title: activeresource Gem for Ruby lib/active_resource/base.rb element_path Lack of Encoding
|
6
|
-
date: 2020-05-05
|
7
|
-
description: |
|
8
|
-
activeresource contains a lack of encoding flaw in the element_path function of
|
9
|
-
lib/active_resource/base.rb.
|
10
|
-
|
11
|
-
There is an issue with the way Active Resource encodes data before querying the back end server. This encoding mechanism can allow specially crafted requests to possibly access data that may not be expected.
|
12
|
-
|
13
|
-
Impacted code will look something like this:
|
14
|
-
|
15
|
-
```
|
16
|
-
require 'activeresource'
|
17
|
-
|
18
|
-
class Test < ActiveResource::Base
|
19
|
-
self.site = 'http://127.0.0.1:3000'
|
20
|
-
end
|
21
|
-
|
22
|
-
Test.exists?(untrusted_user_input)
|
23
|
-
```
|
24
|
-
|
25
|
-
Where untrusted user input is passed to an Active Resource model. Specially crafted untrusted input can cause Active Resource to access data in an unexpected way and possibly leak information.
|
26
|
-
|
27
|
-
Workarounds
|
28
|
-
-------------
|
29
|
-
|
30
|
-
For those that can't upgrade, the following monkey patch can be applied:
|
31
|
-
|
32
|
-
```
|
33
|
-
module ActiveResource
|
34
|
-
class Base
|
35
|
-
class << self
|
36
|
-
def element_path(id, prefix_options = {}, query_options = nil)
|
37
|
-
check_prefix_options(prefix_options)
|
38
|
-
|
39
|
-
prefix_options, query_options = split_options(prefix_options) if query_options.nil?
|
40
|
-
"#{prefix(prefix_options)}#{collection_name}/#{URI.encode_www_form_component(id.to_s)}#{format_extension}#{query_string(query_options)}"
|
41
|
-
end
|
42
|
-
end
|
43
|
-
end
|
44
|
-
end
|
45
|
-
```
|
46
|
-
|
47
|
-
patched_versions:
|
48
|
-
- ">= 5.1.1"
|
@@ -1,15 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activeresource
|
3
|
-
osvdb: 95749
|
4
|
-
url: http://osvdb.org/show/osvdb/95749
|
5
|
-
title: activeresource Gem for Ruby lib/active_resource/connection.rb request Function Multiple Variable Format String
|
6
|
-
date: 2008-08-15
|
7
|
-
description: |
|
8
|
-
activeresource contains a format string flaw in the request function of
|
9
|
-
lib/active_resource/connection.rb. The issue is triggered as format string
|
10
|
-
specifiers (e.g. %s and %x) are not properly sanitized in user-supplied input
|
11
|
-
when passed via the 'result.code' and 'result.message' variables. This may
|
12
|
-
allow a remote attacker to cause a denial of service or potentially execute
|
13
|
-
arbitrary code.
|
14
|
-
patched_versions:
|
15
|
-
- ">= 2.2.0"
|
@@ -1,43 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activestorage
|
3
|
-
framework: rails
|
4
|
-
cve: 2018-16477
|
5
|
-
url: https://groups.google.com/forum/#!topic/rubyonrails-security/3KQRnXDIuLg
|
6
|
-
title: Bypass vulnerability in Active Storage
|
7
|
-
date: 2018-11-27
|
8
|
-
|
9
|
-
description: |
|
10
|
-
There is a vulnerability in Active Storage. This vulnerability has been
|
11
|
-
assigned the CVE identifier CVE-2018-16477.
|
12
|
-
|
13
|
-
Versions Affected: >= 5.2.0
|
14
|
-
Not affected: < 5.2.0
|
15
|
-
Fixed Versions: 5.2.1.1
|
16
|
-
|
17
|
-
Impact
|
18
|
-
------
|
19
|
-
Signed download URLs generated by `ActiveStorage` for Google Cloud Storage
|
20
|
-
service and Disk service include `content-disposition` and `content-type`
|
21
|
-
parameters that an attacker can modify. This can be used to upload specially
|
22
|
-
crafted HTML files and have them served and executed inline. Combined with
|
23
|
-
other techniques such as cookie bombing and specially crafted AppCache manifests,
|
24
|
-
an attacker can gain access to private signed URLs within a specific storage path.
|
25
|
-
|
26
|
-
Vulnerable apps are those using either GCS or the Disk service in production.
|
27
|
-
Other storage services such as S3 or Azure aren't affected.
|
28
|
-
|
29
|
-
All users running an affected release should either upgrade or use one of the
|
30
|
-
workarounds immediately. For those using GCS, it's also recommended to run the
|
31
|
-
following to update existing blobs:
|
32
|
-
|
33
|
-
```
|
34
|
-
ActiveStorage::Blob.find_each do |blob|
|
35
|
-
blob.send :update_service_metadata
|
36
|
-
end
|
37
|
-
```
|
38
|
-
|
39
|
-
unaffected_versions:
|
40
|
-
- "< 5.2.0"
|
41
|
-
|
42
|
-
patched_versions:
|
43
|
-
- ">= 5.2.1.1"
|
@@ -1,31 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activestorage
|
3
|
-
framework: rails
|
4
|
-
cve: 2020-8162
|
5
|
-
url: https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ
|
6
|
-
title: Circumvention of file size limits in ActiveStorage
|
7
|
-
date: 2020-05-18
|
8
|
-
|
9
|
-
description: |
|
10
|
-
There is a vulnerability in ActiveStorage's S3 adapter that allows the Content-Length of a
|
11
|
-
direct file upload to be modified by an end user.
|
12
|
-
|
13
|
-
Versions Affected: rails < 5.2.4.2, rails < 6.0.3.1
|
14
|
-
Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter.
|
15
|
-
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
|
16
|
-
|
17
|
-
Impact
|
18
|
-
------
|
19
|
-
|
20
|
-
Utilizing this vulnerability, an attacker can control the Content-Length of an S3 direct upload URL without receiving a
|
21
|
-
new signature from the server. This could be used to bypass controls in place on the server to limit upload size.
|
22
|
-
|
23
|
-
Workarounds
|
24
|
-
-----------
|
25
|
-
|
26
|
-
This is a low-severity security issue. As such, no workaround is necessarily
|
27
|
-
until such time as the application can be upgraded.
|
28
|
-
|
29
|
-
patched_versions:
|
30
|
-
- "~> 5.2.4.3"
|
31
|
-
- ">= 6.0.3.1"
|
@@ -1,26 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activesupport
|
3
|
-
framework: rails
|
4
|
-
cve: 2012-1098
|
5
|
-
osvdb: 79726
|
6
|
-
url: https://nvd.nist.gov/vuln/detail/CVE-2012-1098
|
7
|
-
title: Ruby on Rails SafeBuffer Object [] Direct Manipulation XSS
|
8
|
-
date: 2012-03-01
|
9
|
-
|
10
|
-
description: |
|
11
|
-
Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
|
12
|
-
attack. This flaw exists because athe application does not validate direct
|
13
|
-
manipulations of SafeBuffer objects via '[]' and other methods. This may
|
14
|
-
allow a user to create a specially crafted request that would execute
|
15
|
-
arbitrary script code in a user's browser within the trust relationship
|
16
|
-
between their browser and the server.
|
17
|
-
|
18
|
-
cvss_v2: 4.3
|
19
|
-
|
20
|
-
unaffected_versions:
|
21
|
-
- "< 3.0.0"
|
22
|
-
|
23
|
-
patched_versions:
|
24
|
-
- ~> 3.0.12
|
25
|
-
- ~> 3.1.4
|
26
|
-
- ">= 3.2.2"
|
@@ -1,23 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activesupport
|
3
|
-
framework: rails
|
4
|
-
cve: 2012-3464
|
5
|
-
osvdb: 84516
|
6
|
-
url: https://nvd.nist.gov/vuln/detail/CVE-2012-3464
|
7
|
-
title: Ruby on Rails HTML Escaping Code XSS
|
8
|
-
date: 2012-08-09
|
9
|
-
|
10
|
-
description: |
|
11
|
-
Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
|
12
|
-
attack. This flaw exists because the HTML escaping code functionality does
|
13
|
-
not properly escape a single quote character. This may allow a user to create
|
14
|
-
a specially crafted request that would execute arbitrary script code in a
|
15
|
-
user's browser within the trust relationship between their browser and the
|
16
|
-
server.
|
17
|
-
|
18
|
-
cvss_v2: 4.3
|
19
|
-
|
20
|
-
patched_versions:
|
21
|
-
- ~> 3.0.17
|
22
|
-
- ~> 3.1.8
|
23
|
-
- ">= 3.2.8"
|
@@ -1,25 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activesupport
|
3
|
-
framework: rails
|
4
|
-
cve: 2013-0333
|
5
|
-
osvdb: 89594
|
6
|
-
url: https://nvd.nist.gov/vuln/detail/CVE-2013-0333
|
7
|
-
title:
|
8
|
-
Ruby on Rails JSON Parser Crafted Payload YAML Subset Decoding Remote Code
|
9
|
-
Execution
|
10
|
-
date: 2013-01-28
|
11
|
-
|
12
|
-
description: |
|
13
|
-
Ruby on Rails contains a flaw in the JSON parser. Rails supports multiple
|
14
|
-
parsing backends, one of which involves transforming JSON into YAML via the
|
15
|
-
YAML parser. With a specially crafted payload, an attacker can subvert the
|
16
|
-
backend into decoding a subset of YAML. This may allow a remote attacker to
|
17
|
-
bypass restrictions, allowing them to bypass authentication systems, inject
|
18
|
-
arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on
|
19
|
-
a Rails application.
|
20
|
-
|
21
|
-
cvss_v2: 9.3
|
22
|
-
|
23
|
-
patched_versions:
|
24
|
-
- ~> 2.3.16
|
25
|
-
- ">= 3.0.20"
|
@@ -1,28 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activesupport
|
3
|
-
framework: rails
|
4
|
-
platform: jruby
|
5
|
-
cve: 2013-1856
|
6
|
-
osvdb: 91451
|
7
|
-
url: https://nvd.nist.gov/vuln/detail/CVE-2013-1856
|
8
|
-
title: XML Parsing Vulnerability affecting JRuby users
|
9
|
-
date: 2013-03-19
|
10
|
-
|
11
|
-
description: |
|
12
|
-
The ActiveSupport XML parsing functionality supports multiple
|
13
|
-
pluggable backends. One backend supported for JRuby users is
|
14
|
-
ActiveSupport::XmlMini_JDOM which makes use of the
|
15
|
-
javax.xml.parsers.DocumentBuilder class. In some JVM configurations
|
16
|
-
the default settings of that class can allow an attacker to construct
|
17
|
-
XML which, when parsed, will contain the contents of arbitrary URLs
|
18
|
-
including files from the application server. They may also allow for
|
19
|
-
various denial of service attacks. Action Pack
|
20
|
-
|
21
|
-
cvss_v2: 7.8
|
22
|
-
|
23
|
-
unaffected_versions:
|
24
|
-
- ~> 2.3.0
|
25
|
-
|
26
|
-
patched_versions:
|
27
|
-
- ~> 3.1.12
|
28
|
-
- ">= 3.2.13"
|
@@ -1,55 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activesupport
|
3
|
-
framework: rails
|
4
|
-
cve: 2015-3226
|
5
|
-
url: https://groups.google.com/forum/#!topic/ruby-security-ann/7VlB_pck3hU
|
6
|
-
title: |
|
7
|
-
XSS Vulnerability in ActiveSupport::JSON.encode
|
8
|
-
date: 2015-06-16
|
9
|
-
|
10
|
-
description: |
|
11
|
-
When a `Hash` containing user-controlled data is encode as JSON (either through
|
12
|
-
`Hash#to_json` or `ActiveSupport::JSON.encode`), Rails does not perform adequate
|
13
|
-
escaping that matches the guarantee implied by the `escape_html_entities_in_json`
|
14
|
-
option (which is enabled by default). If this resulting JSON string is subsequently
|
15
|
-
inserted directly into an HTML page, the page will be vulnerable to XSS attacks.
|
16
|
-
|
17
|
-
For example, the following code snippet is vulnerable to this attack:
|
18
|
-
|
19
|
-
<%= javascript_tag "var data = #{user_supplied_data.to_json};" %>
|
20
|
-
|
21
|
-
Similarly, the following is also vulnerable:
|
22
|
-
|
23
|
-
<script>
|
24
|
-
var data = <%= ActiveSupport::JSON.encode(user_supplied_data).html_safe %>;
|
25
|
-
</script>
|
26
|
-
|
27
|
-
All applications that renders JSON-encoded strings that contains user-controlled
|
28
|
-
data in their views should either upgrade to one of the FIXED versions or use
|
29
|
-
the suggested workaround immediately.
|
30
|
-
|
31
|
-
Workarounds
|
32
|
-
-----------
|
33
|
-
To work around this problem add an initializer with the following code:
|
34
|
-
|
35
|
-
module ActiveSupport
|
36
|
-
module JSON
|
37
|
-
module Encoding
|
38
|
-
private
|
39
|
-
class EscapedString
|
40
|
-
def to_s
|
41
|
-
self
|
42
|
-
end
|
43
|
-
end
|
44
|
-
end
|
45
|
-
end
|
46
|
-
end
|
47
|
-
|
48
|
-
unaffected_versions:
|
49
|
-
- "< 4.1.0"
|
50
|
-
|
51
|
-
patched_versions:
|
52
|
-
- ">= 4.2.2"
|
53
|
-
- "~> 4.1.11"
|
54
|
-
|
55
|
-
|
@@ -1,33 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activesupport
|
3
|
-
framework: rails
|
4
|
-
cve: 2015-3227
|
5
|
-
url: https://groups.google.com/forum/#!topic/rubyonrails-security/bahr2JLnxvk
|
6
|
-
title: |
|
7
|
-
Possible Denial of Service attack in Active Support
|
8
|
-
|
9
|
-
date: 2015-06-16
|
10
|
-
|
11
|
-
description: |
|
12
|
-
Specially crafted XML documents can cause applications to raise a
|
13
|
-
`SystemStackError` and potentially cause a denial of service attack. This
|
14
|
-
only impacts applications using REXML or JDOM as their XML processor. Other
|
15
|
-
XML processors that Rails supports are not impacted.
|
16
|
-
|
17
|
-
All users running an affected release should either upgrade or use one of the work arounds immediately.
|
18
|
-
|
19
|
-
Workarounds
|
20
|
-
-----------
|
21
|
-
Use an XML parser that is not impacted by this problem, such as Nokogiri or
|
22
|
-
LibXML. You can change the processor like this:
|
23
|
-
|
24
|
-
ActiveSupport::XmlMini.backend = 'Nokogiri'
|
25
|
-
|
26
|
-
If you cannot change XML parsers, then adjust
|
27
|
-
`RUBY_THREAD_MACHINE_STACK_SIZE`.
|
28
|
-
|
29
|
-
|
30
|
-
patched_versions:
|
31
|
-
- ">= 4.2.2"
|
32
|
-
- "~> 4.1.11"
|
33
|
-
- "~> 3.2.22"
|
@@ -1,41 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: activesupport
|
3
|
-
framework: rails
|
4
|
-
cve: 2020-8165
|
5
|
-
date: 2020-05-18
|
6
|
-
url: https://groups.google.com/forum/#!topic/rubyonrails-security/bv6fW4S0Y1c
|
7
|
-
title: Potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore
|
8
|
-
description: |
|
9
|
-
There is potentially unexpected behaviour in the MemCacheStore and RedisCacheStore where, when
|
10
|
-
untrusted user input is written to the cache store using the `raw: true` parameter, re-reading the result
|
11
|
-
from the cache can evaluate the user input as a Marshalled object instead of plain text. Vulnerable code looks like:
|
12
|
-
|
13
|
-
```
|
14
|
-
data = cache.fetch("demo", raw: true) { untrusted_string }
|
15
|
-
```
|
16
|
-
|
17
|
-
Versions Affected: rails < 5.2.5, rails < 6.0.4
|
18
|
-
Not affected: Applications not using MemCacheStore or RedisCacheStore. Applications that do not use the `raw` option when storing untrusted user input.
|
19
|
-
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
|
20
|
-
|
21
|
-
Impact
|
22
|
-
------
|
23
|
-
|
24
|
-
Unmarshalling of untrusted user input can have impact up to and including RCE. At a minimum,
|
25
|
-
this vulnerability allows an attacker to inject untrusted Ruby objects into a web application.
|
26
|
-
|
27
|
-
In addition to upgrading to the latest versions of Rails, developers should ensure that whenever
|
28
|
-
they are calling `Rails.cache.fetch` they are using consistent values of the `raw` parameter for both
|
29
|
-
reading and writing, especially in the case of the RedisCacheStore which does not, prior to these changes,
|
30
|
-
detect if data was serialized using the raw option upon deserialization.
|
31
|
-
|
32
|
-
Workarounds
|
33
|
-
-----------
|
34
|
-
|
35
|
-
It is recommended that application developers apply the suggested patch or upgrade to the latest release as
|
36
|
-
soon as possible. If this is not possible, we recommend ensuring that all user-provided strings cached using
|
37
|
-
the `raw` argument should be double-checked to ensure that they conform to the expected format.
|
38
|
-
|
39
|
-
patched_versions:
|
40
|
-
- "~> 5.2.4.3"
|
41
|
-
- ">= 6.0.3.1"
|
@@ -1,14 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: administrate
|
3
|
-
cve: 2016-3098
|
4
|
-
title: Cross-site request forgery (CSRF) vulnerability in administrate gem
|
5
|
-
date: 2016-04-01
|
6
|
-
url: http://seclists.org/oss-sec/2016/q2/0
|
7
|
-
|
8
|
-
description: >-
|
9
|
-
`Administrate::ApplicationController` actions didn't have CSRF
|
10
|
-
protection. Remote attackers can hijack user's sessions and use any
|
11
|
-
functionality that administrate exposes on their behalf.
|
12
|
-
|
13
|
-
patched_versions:
|
14
|
-
- ">= 0.1.5"
|
@@ -1,24 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: administrate
|
3
|
-
cve: 2020-5257
|
4
|
-
ghsa: 2p5p-m353-833w
|
5
|
-
title: Sort order SQL injection via `direction` parameter in administrate
|
6
|
-
date: 2020-03-14
|
7
|
-
url: https://github.com/advisories/GHSA-2p5p-m353-833w
|
8
|
-
description: |
|
9
|
-
In Administrate (rubygem) before version 0.13.0, when sorting by attributes
|
10
|
-
on a dashboard, the direction parameter was not validated before being
|
11
|
-
interpolated into the SQL query.
|
12
|
-
|
13
|
-
This could present a SQL injection if the attacker were able to modify the
|
14
|
-
direction parameter and bypass ActiveRecord SQL protections.
|
15
|
-
|
16
|
-
Whilst this does have a high-impact, to exploit this you need access to the
|
17
|
-
Administrate dashboards, which should generally be behind authentication.
|
18
|
-
|
19
|
-
patched_versions:
|
20
|
-
- ">= 0.13.0"
|
21
|
-
|
22
|
-
related:
|
23
|
-
url:
|
24
|
-
- https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3
|
@@ -1,10 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: aescrypt
|
3
|
-
cve: 2013-7463
|
4
|
-
date: 2013-10-01
|
5
|
-
url: https://github.com/Gurpartap/aescrypt/issues/4
|
6
|
-
title: Vulnerability in aescrypt because IV is not randomized
|
7
|
-
description: |
|
8
|
-
The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the
|
9
|
-
AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to
|
10
|
-
defeat cryptographic protection mechanisms via a chosen plaintext attack.
|