bundler-audit 0.7.0 → 0.7.0.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/ChangeLog.md +5 -1
- data/Rakefile +5 -1
- data/data/ruby-advisory-db.ts +1 -1
- data/data/ruby-advisory-db/.gitignore +1 -0
- data/data/ruby-advisory-db/.rspec +1 -0
- data/data/ruby-advisory-db/.travis.yml +12 -0
- data/data/ruby-advisory-db/CONTRIBUTING.md +71 -0
- data/data/ruby-advisory-db/CONTRIBUTORS.md +41 -0
- data/data/ruby-advisory-db/Gemfile +11 -0
- data/data/ruby-advisory-db/LICENSE.txt +5 -0
- data/data/ruby-advisory-db/README.md +133 -0
- data/data/ruby-advisory-db/Rakefile +22 -0
- data/data/ruby-advisory-db/gems/Arabic-Prawn/CVE-2014-2322.yml +12 -0
- data/data/ruby-advisory-db/gems/RedCloth/CVE-2012-6684.yml +21 -0
- data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4995.yml +13 -0
- data/data/ruby-advisory-db/gems/VladTheEnterprising/CVE-2014-4996.yml +13 -0
- data/data/ruby-advisory-db/gems/actionmailer/CVE-2013-4389.yml +17 -0
- data/data/ruby-advisory-db/gems/actionpack-page_caching/CVE-2020-8159.yml +40 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2012-1099.yml +26 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2012-3424.yml +28 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2012-3463.yml +26 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2012-3465.yml +23 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2013-0156.yml +24 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2013-1855.yml +20 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2013-1857.yml +23 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-0081.yml +24 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-0082.yml +22 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-0130.yml +23 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7818.yml +24 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2014-7829.yml +26 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7576.yml +119 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2015-7581.yml +55 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-0751.yml +74 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-0752.yml +96 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-2097.yml +91 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-2098.yml +89 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2016-6316.yml +57 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2020-8164.yml +49 -0
- data/data/ruby-advisory-db/gems/actionpack/CVE-2020-8166.yml +31 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +20 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +21 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +27 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +24 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +22 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-74616.yml +18 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-77199.yml +23 -0
- data/data/ruby-advisory-db/gems/actionview/CVE-2016-0752.yml +95 -0
- data/data/ruby-advisory-db/gems/actionview/CVE-2016-2097.yml +89 -0
- data/data/ruby-advisory-db/gems/actionview/CVE-2016-6316.yml +56 -0
- data/data/ruby-advisory-db/gems/actionview/CVE-2019-5418.yml +98 -0
- data/data/ruby-advisory-db/gems/actionview/CVE-2019-5419.yml +95 -0
- data/data/ruby-advisory-db/gems/actionview/CVE-2020-5267.yml +69 -0
- data/data/ruby-advisory-db/gems/actionview/CVE-2020-8163.yml +29 -0
- data/data/ruby-advisory-db/gems/actionview/CVE-2020-8167.yml +45 -0
- data/data/ruby-advisory-db/gems/active-support/CVE-2018-3779.yml +17 -0
- data/data/ruby-advisory-db/gems/activejob/CVE-2018-16476.yml +36 -0
- data/data/ruby-advisory-db/gems/activemodel/CVE-2016-0753.yml +95 -0
- data/data/ruby-advisory-db/gems/activerecord-jdbc-adapter/OSVDB-114854.yml +20 -0
- data/data/ruby-advisory-db/gems/activerecord-oracle_enhanced-adapter/OSVDB-95376.yml +15 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2012-2660.yml +24 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2012-2661.yml +25 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2013-0155.yml +24 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2013-0276.yml +21 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2013-0277.yml +23 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2013-1854.yml +26 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2014-0080.yml +23 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2014-3482.yml +23 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2014-3483.yml +24 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2014-3514.yml +23 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2015-7577.yml +110 -0
- data/data/ruby-advisory-db/gems/activerecord/CVE-2016-6317.yml +73 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-88661.yml +20 -0
- data/data/ruby-advisory-db/gems/activeresource/CVE-2020-8151.yml +48 -0
- data/data/ruby-advisory-db/gems/activeresource/OSVDB-95749.yml +15 -0
- data/data/ruby-advisory-db/gems/activestorage/CVE-2018-16477.yml +43 -0
- data/data/ruby-advisory-db/gems/activestorage/CVE-2020-8162.yml +31 -0
- data/data/ruby-advisory-db/gems/activesupport/CVE-2012-1098.yml +26 -0
- data/data/ruby-advisory-db/gems/activesupport/CVE-2012-3464.yml +23 -0
- data/data/ruby-advisory-db/gems/activesupport/CVE-2013-0333.yml +25 -0
- data/data/ruby-advisory-db/gems/activesupport/CVE-2013-1856.yml +28 -0
- data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3226.yml +55 -0
- data/data/ruby-advisory-db/gems/activesupport/CVE-2015-3227.yml +33 -0
- data/data/ruby-advisory-db/gems/activesupport/CVE-2020-8165.yml +41 -0
- data/data/ruby-advisory-db/gems/administrate/CVE-2016-3098.yml +14 -0
- data/data/ruby-advisory-db/gems/administrate/CVE-2020-5257.yml +24 -0
- data/data/ruby-advisory-db/gems/aescrypt/CVE-2013-7463.yml +10 -0
- data/data/ruby-advisory-db/gems/airbrake-ruby/CVE-2019-16060.yml +18 -0
- data/data/ruby-advisory-db/gems/archive-tar-minitar/CVE-2016-10173.yml +16 -0
- data/data/ruby-advisory-db/gems/as/OSVDB-112683.yml +10 -0
- data/data/ruby-advisory-db/gems/authlogic/CVE-2012-6497.yml +15 -0
- data/data/ruby-advisory-db/gems/auto_awesomplete/OSVDB-132800.yml +11 -0
- data/data/ruby-advisory-db/gems/auto_select2/OSVDB-132800.yml +13 -0
- data/data/ruby-advisory-db/gems/awesome-bot/CVE-2019-15224.yml +19 -0
- data/data/ruby-advisory-db/gems/awesome_spawn/CVE-2014-0156.yml +19 -0
- data/data/ruby-advisory-db/gems/backup-agoddard/CVE-2014-4993.yml +8 -0
- data/data/ruby-advisory-db/gems/backup_checksum/CVE-2014-4993.yml +12 -0
- data/data/ruby-advisory-db/gems/backup_checksum/OSVDB-108570.yml +10 -0
- data/data/ruby-advisory-db/gems/bcrypt-ruby/OSVDB-62067.yml +19 -0
- data/data/ruby-advisory-db/gems/bcrypt/OSVDB-62067.yml +17 -0
- data/data/ruby-advisory-db/gems/bibtex-ruby/CVE-2019-10780.yml +16 -0
- data/data/ruby-advisory-db/gems/bio-basespace-sdk/CVE-2013-7111.yml +8 -0
- data/data/ruby-advisory-db/gems/bitcoin_vanity/CVE-2019-15224.yml +18 -0
- data/data/ruby-advisory-db/gems/blockchain_wallet/CVE-2019-15224.yml +19 -0
- data/data/ruby-advisory-db/gems/bootstrap-sass/CVE-2016-10735.yml +20 -0
- data/data/ruby-advisory-db/gems/bootstrap-sass/CVE-2019-10842.yml +25 -0
- data/data/ruby-advisory-db/gems/bootstrap-sass/CVE-2019-8331.yml +20 -0
- data/data/ruby-advisory-db/gems/bootstrap/CVE-2016-10735.yml +20 -0
- data/data/ruby-advisory-db/gems/bootstrap/CVE-2018-14040.yml +24 -0
- data/data/ruby-advisory-db/gems/bootstrap/CVE-2019-8331.yml +20 -0
- data/data/ruby-advisory-db/gems/brakeman/CVE-2019-18409.yml +26 -0
- data/data/ruby-advisory-db/gems/brbackup/CVE-2014-5004.yml +11 -0
- data/data/ruby-advisory-db/gems/brbackup/OSVDB-108899.yml +12 -0
- data/data/ruby-advisory-db/gems/brbackup/OSVDB-108900.yml +11 -0
- data/data/ruby-advisory-db/gems/bson/CVE-2015-4411.yml +21 -0
- data/data/ruby-advisory-db/gems/bson/CVE-2015-4412.yml +18 -0
- data/data/ruby-advisory-db/gems/builder/OSVDB-95668.yml +13 -0
- data/data/ruby-advisory-db/gems/bundler/CVE-2013-0334.yml +15 -0
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115090.yml +13 -0
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115091.yml +12 -0
- data/data/ruby-advisory-db/gems/bundler/OSVDB-115917.yml +12 -0
- data/data/ruby-advisory-db/gems/cairo/CVE-2017-7475.yml +15 -0
- data/data/ruby-advisory-db/gems/cap-strap/CVE-2014-4992.yml +8 -0
- data/data/ruby-advisory-db/gems/cap-strap/OSVDB-108575.yml +7 -0
- data/data/ruby-advisory-db/gems/capistrano-colors/CVE-2019-15224.yml +19 -0
- data/data/ruby-advisory-db/gems/chartkick/CVE-2019-12732.yml +21 -0
- data/data/ruby-advisory-db/gems/chartkick/CVE-2019-18841.yml +13 -0
- data/data/ruby-advisory-db/gems/chloride/CVE-2018-6517.yml +17 -0
- data/data/ruby-advisory-db/gems/ciborg/CVE-2014-5003.yml +8 -0
- data/data/ruby-advisory-db/gems/cocaine/CVE-2013-4457.yml +15 -0
- data/data/ruby-advisory-db/gems/codders-dataset/CVE-2014-4991.yml +8 -0
- data/data/ruby-advisory-db/gems/coin_base/CVE-2019-15224.yml +18 -0
- data/data/ruby-advisory-db/gems/colorscore/CVE-2015-7541.yml +21 -0
- data/data/ruby-advisory-db/gems/coming-soon/CVE-2019-15224.yml +18 -0
- data/data/ruby-advisory-db/gems/command_wrap/CVE-2013-1875.yml +9 -0
- data/data/ruby-advisory-db/gems/consul/CVE-2019-16377.yml +15 -0
- data/data/ruby-advisory-db/gems/crack/CVE-2013-1800.yml +17 -0
- data/data/ruby-advisory-db/gems/cremefraiche/CVE-2013-2090.yml +11 -0
- data/data/ruby-advisory-db/gems/cron_parser/CVE-2019-15224.yml +20 -0
- data/data/ruby-advisory-db/gems/curb/OSVDB-114600.yml +12 -0
- data/data/ruby-advisory-db/gems/curl/CVE-2013-2617.yml +13 -0
- data/data/ruby-advisory-db/gems/datagrid/CVE-2019-14281.yml +14 -0
- data/data/ruby-advisory-db/gems/delayed_job_web/CVE-2017-12097.yml +17 -0
- data/data/ruby-advisory-db/gems/devise-two-factor/CVE-2015-7225.yml +22 -0
- data/data/ruby-advisory-db/gems/devise/CVE-2013-0233.yml +20 -0
- data/data/ruby-advisory-db/gems/devise/CVE-2015-8314.yml +14 -0
- data/data/ruby-advisory-db/gems/devise/CVE-2019-16109.yml +13 -0
- data/data/ruby-advisory-db/gems/devise/CVE-2019-5421.yml +16 -0
- data/data/ruby-advisory-db/gems/devise/OSVDB-114435.yml +17 -0
- data/data/ruby-advisory-db/gems/doge-coin/CVE-2019-15224.yml +19 -0
- data/data/ruby-advisory-db/gems/doorkeeper-openid_connect/CVE-2019-9837.yml +16 -0
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2014-8144.yml +26 -0
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2016-6582.yml +43 -0
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2018-1000088.yml +39 -0
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2018-1000211.yml +39 -0
- data/data/ruby-advisory-db/gems/doorkeeper/CVE-2020-10187.yml +34 -0
- data/data/ruby-advisory-db/gems/doorkeeper/OSVDB-118830.yml +17 -0
- data/data/ruby-advisory-db/gems/dragonfly/CVE-2013-1756.yml +16 -0
- data/data/ruby-advisory-db/gems/dragonfly/CVE-2013-5671.yml +14 -0
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-110439.yml +13 -0
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-97854.yml +12 -0
- data/data/ruby-advisory-db/gems/easymon/CVE-2018-1000855.yml +16 -0
- data/data/ruby-advisory-db/gems/echor/CVE-2014-1834.yml +12 -0
- data/data/ruby-advisory-db/gems/echor/CVE-2014-1835.yml +11 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2013-4170.yml +25 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0013.yml +33 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0014.yml +30 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml +26 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2015-1866.yml +26 -0
- data/data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml +30 -0
- data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +9 -0
- data/data/ruby-advisory-db/gems/espeak-ruby/CVE-2016-10193.yml +15 -0
- data/data/ruby-advisory-db/gems/excon/CVE-2019-16779.yml +23 -0
- data/data/ruby-advisory-db/gems/extlib/CVE-2013-1802.yml +18 -0
- data/data/ruby-advisory-db/gems/fastreader/CVE-2013-2615.yml +13 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2013-7222.yml +17 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2013-7223.yml +19 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2013-7224.yml +17 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2013-7225.yml +19 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2013-7249.yml +16 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2014-5441.yml +19 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2015-1585.yml +17 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2018-1000842.yml +23 -0
- data/data/ruby-advisory-db/gems/fat_free_crm/CVE-2018-20975.yml +12 -0
- data/data/ruby-advisory-db/gems/faye/CVE-2020-11020.yml +91 -0
- data/data/ruby-advisory-db/gems/features/CVE-2013-4318.yml +8 -0
- data/data/ruby-advisory-db/gems/festivaltts4r/CVE-2016-10194.yml +12 -0
- data/data/ruby-advisory-db/gems/ffi/CVE-2018-1000201.yml +22 -0
- data/data/ruby-advisory-db/gems/field_test/CVE-2019-13146.yml +20 -0
- data/data/ruby-advisory-db/gems/fileutils/CVE-2013-2516.yml +11 -0
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +7 -0
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +7 -0
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90718.yml +7 -0
- data/data/ruby-advisory-db/gems/flash_tool/CVE-2013-2513.yml +8 -0
- data/data/ruby-advisory-db/gems/flavour_saver/OSVDB-110796.yml +14 -0
- data/data/ruby-advisory-db/gems/flukso4r/OSVDB-101577.yml +7 -0
- data/data/ruby-advisory-db/gems/fog-dragonfly/CVE-2013-1756.yml +18 -0
- data/data/ruby-advisory-db/gems/fog-dragonfly/CVE-2013-5671.yml +16 -0
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-110439.yml +15 -0
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-97854.yml +12 -0
- data/data/ruby-advisory-db/gems/ftpd/CVE-2013-2512.yml +18 -0
- data/data/ruby-advisory-db/gems/geminabox/CVE-2017-16792.yml +21 -0
- data/data/ruby-advisory-db/gems/gemirro/CVE-2017-16833.yml +22 -0
- data/data/ruby-advisory-db/gems/git-fastclone/CVE-2015-8968.yml +21 -0
- data/data/ruby-advisory-db/gems/git-fastclone/CVE-2015-8969.yml +13 -0
- data/data/ruby-advisory-db/gems/gitlab-grit/CVE-2013-4489.yml +14 -0
- data/data/ruby-advisory-db/gems/gnms/OSVDB-108594.yml +7 -0
- data/data/ruby-advisory-db/gems/gollum-grit_adapter/CVE-2014-9489.yml +23 -0
- data/data/ruby-advisory-db/gems/gollum/CVE-2015-7314.yml +13 -0
- data/data/ruby-advisory-db/gems/grape/CVE-2018-3769.yml +20 -0
- data/data/ruby-advisory-db/gems/gtk2/CVE-2007-6183.yml +20 -0
- data/data/ruby-advisory-db/gems/gyazo/CVE-2014-4994.yml +10 -0
- data/data/ruby-advisory-db/gems/haml/CVE-2017-1002201.yml +19 -0
- data/data/ruby-advisory-db/gems/handlebars-source/OSVDB-131671.yml +17 -0
- data/data/ruby-advisory-db/gems/http/CVE-2015-1828.yml +14 -0
- data/data/ruby-advisory-db/gems/httparty/CVE-2013-1801.yml +14 -0
- data/data/ruby-advisory-db/gems/i18n/CVE-2014-10077.yml +18 -0
- data/data/ruby-advisory-db/gems/i18n/OSVDB-100528.yml +17 -0
- data/data/ruby-advisory-db/gems/iodine/GHSA-85rf-xh54-whp3.yml +21 -0
- data/data/ruby-advisory-db/gems/jekyll/CVE-2018-17567.yml +14 -0
- data/data/ruby-advisory-db/gems/jquery-rails/CVE-2015-1840.yml +36 -0
- data/data/ruby-advisory-db/gems/jquery-rails/CVE-2019-11358.yml +24 -0
- data/data/ruby-advisory-db/gems/jquery-ui-rails/CVE-2016-7103.yml +23 -0
- data/data/ruby-advisory-db/gems/jquery-ujs/CVE-2015-1840.yml +35 -0
- data/data/ruby-advisory-db/gems/jruby-openssl/CVE-2009-4123.yml +16 -0
- data/data/ruby-advisory-db/gems/jruby-sandbox/OSVDB-106279.yml +12 -0
- data/data/ruby-advisory-db/gems/json-jwt/CVE-2018-1000539.yml +21 -0
- data/data/ruby-advisory-db/gems/json-jwt/CVE-2019-18848.yml +15 -0
- data/data/ruby-advisory-db/gems/json/CVE-2013-0269.yml +20 -0
- data/data/ruby-advisory-db/gems/json/CVE-2020-10663.yml +35 -0
- data/data/ruby-advisory-db/gems/json/OSVDB-101157.yml +14 -0
- data/data/ruby-advisory-db/gems/kafo/CVE-2014-0135.yml +15 -0
- data/data/ruby-advisory-db/gems/kajam/CVE-2014-4999.yml +12 -0
- data/data/ruby-advisory-db/gems/kajam/OSVDB-108530.yml +11 -0
- data/data/ruby-advisory-db/gems/kaminari/CVE-2020-11082.yml +34 -0
- data/data/ruby-advisory-db/gems/karo/OSVDB-108573.yml +10 -0
- data/data/ruby-advisory-db/gems/karteek-docsplit/CVE-2013-1933.yml +9 -0
- data/data/ruby-advisory-db/gems/kcapifony/CVE-2014-5001.yml +8 -0
- data/data/ruby-advisory-db/gems/kcapifony/OSVDB-108572.yml +7 -0
- data/data/ruby-advisory-db/gems/kelredd-pruview/CVE-2013-1947.yml +9 -0
- data/data/ruby-advisory-db/gems/kompanee-recipes/OSVDB-108593.yml +12 -0
- data/data/ruby-advisory-db/gems/lawn-login/CVE-2014-5000.yml +8 -0
- data/data/ruby-advisory-db/gems/ldap_fluff/CVE-2012-5604.yml +15 -0
- data/data/ruby-advisory-db/gems/ldoce/CVE-2013-1911.yml +9 -0
- data/data/ruby-advisory-db/gems/lean-ruport/CVE-2014-4998.yml +8 -0
- data/data/ruby-advisory-db/gems/lingq/OSVDB-108585.yml +7 -0
- data/data/ruby-advisory-db/gems/lita_coin/CVE-2019-15224.yml +18 -0
- data/data/ruby-advisory-db/gems/loofah/CVE-2018-16468.yml +16 -0
- data/data/ruby-advisory-db/gems/loofah/CVE-2018-8048.yml +11 -0
- data/data/ruby-advisory-db/gems/loofah/CVE-2019-15587.yml +13 -0
- data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +21 -0
- data/data/ruby-advisory-db/gems/lynx/CVE-2014-5002.yml +11 -0
- data/data/ruby-advisory-db/gems/lynx/OSVDB-108579.yml +7 -0
- data/data/ruby-advisory-db/gems/mail/CVE-2011-0739.yml +21 -0
- data/data/ruby-advisory-db/gems/mail/CVE-2012-2139.yml +14 -0
- data/data/ruby-advisory-db/gems/mail/CVE-2012-2140.yml +16 -0
- data/data/ruby-advisory-db/gems/mail/CVE-2015-9097.yml +26 -0
- data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml +25 -0
- data/data/ruby-advisory-db/gems/mapbox-rails/OSVDB-132871.yml +26 -0
- data/data/ruby-advisory-db/gems/marginalia/CVE-2019-1010191.yml +17 -0
- data/data/ruby-advisory-db/gems/matestack-ui-core/CVE-2020-5241.yml +18 -0
- data/data/ruby-advisory-db/gems/md2pdf/CVE-2013-1948.yml +9 -0
- data/data/ruby-advisory-db/gems/mini_magick/CVE-2013-2616.yml +15 -0
- data/data/ruby-advisory-db/gems/mini_magick/CVE-2019-13574.yml +14 -0
- data/data/ruby-advisory-db/gems/minitar/CVE-2016-10173.yml +20 -0
- data/data/ruby-advisory-db/gems/moped/CVE-2015-4410.yml +17 -0
- data/data/ruby-advisory-db/gems/multi_xml/CVE-2013-0175.yml +16 -0
- data/data/ruby-advisory-db/gems/mustache-js-rails/OSVDB-131671.yml +17 -0
- data/data/ruby-advisory-db/gems/mysql-binuuid-rails/CVE-2018-18476.yml +21 -0
- data/data/ruby-advisory-db/gems/net-ldap/CVE-2014-0083.yml +14 -0
- data/data/ruby-advisory-db/gems/net-ldap/CVE-2017-17718.yml +17 -0
- data/data/ruby-advisory-db/gems/netaddr/CVE-2019-17383.yml +13 -0
- data/data/ruby-advisory-db/gems/newrelic_rpm/CVE-2013-0284.yml +17 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2012-6685.yml +15 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2013-6460.yml +18 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2013-6461.yml +15 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-1819.yml +52 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-5312.yml +92 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml +37 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2015-8806.yml +42 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2016-4658.yml +33 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2017-15412.yml +23 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2017-16932.yml +21 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2017-5029.yml +44 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2017-9050.yml +60 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2018-14404.yml +69 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2018-8048.yml +36 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2019-11068.yml +49 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2019-13117.yml +80 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2019-5477.yml +31 -0
- data/data/ruby-advisory-db/gems/nokogiri/CVE-2020-7595.yml +20 -0
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-118481.yml +15 -0
- data/data/ruby-advisory-db/gems/nori/CVE-2013-0285.yml +19 -0
- data/data/ruby-advisory-db/gems/omniauth-facebook/CVE-2013-4562.yml +22 -0
- data/data/ruby-advisory-db/gems/omniauth-facebook/CVE-2013-4593.yml +17 -0
- data/data/ruby-advisory-db/gems/omniauth-oauth2/CVE-2012-6134.yml +16 -0
- data/data/ruby-advisory-db/gems/omniauth-saml/CVE-2017-11430.yml +17 -0
- data/data/ruby-advisory-db/gems/omniauth/CVE-2015-9284.yml +25 -0
- data/data/ruby-advisory-db/gems/omniauth/CVE-2017-18076.yml +18 -0
- data/data/ruby-advisory-db/gems/omniauth_amazon/CVE-2019-15224.yml +19 -0
- data/data/ruby-advisory-db/gems/open-uri-cached/OSVDB-121701.yml +13 -0
- data/data/ruby-advisory-db/gems/openssl/CVE-2016-7798.yml +16 -0
- data/data/ruby-advisory-db/gems/ox/CVE-2017-15928.yml +16 -0
- data/data/ruby-advisory-db/gems/ox/CVE-2017-16229.yml +16 -0
- data/data/ruby-advisory-db/gems/padrino-contrib/CVE-2019-16145.yml +11 -0
- data/data/ruby-advisory-db/gems/paperclip/CVE-2015-2963.yml +16 -0
- data/data/ruby-advisory-db/gems/paperclip/CVE-2017-0889.yml +23 -0
- data/data/ruby-advisory-db/gems/paperclip/OSVDB-103151.yml +13 -0
- data/data/ruby-advisory-db/gems/paranoid2/CVE-2019-13589.yml +16 -0
- data/data/ruby-advisory-db/gems/paratrooper-newrelic/CVE-2014-1234.yml +13 -0
- data/data/ruby-advisory-db/gems/paratrooper-pingdom/CVE-2014-1233.yml +13 -0
- data/data/ruby-advisory-db/gems/passenger/CVE-2013-2119.yml +15 -0
- data/data/ruby-advisory-db/gems/passenger/CVE-2013-4136.yml +14 -0
- data/data/ruby-advisory-db/gems/passenger/CVE-2014-1831.yml +13 -0
- data/data/ruby-advisory-db/gems/passenger/CVE-2014-1832.yml +13 -0
- data/data/ruby-advisory-db/gems/passenger/CVE-2015-7519.yml +17 -0
- data/data/ruby-advisory-db/gems/passenger/CVE-2016-10345.yml +17 -0
- data/data/ruby-advisory-db/gems/passenger/OSVDB-90738.yml +16 -0
- data/data/ruby-advisory-db/gems/pdfkit/CVE-2013-1607.yml +11 -0
- data/data/ruby-advisory-db/gems/point-cli/CVE-2014-4997.yml +8 -0
- data/data/ruby-advisory-db/gems/private_address_check/CVE-2017-0904.yml +17 -0
- data/data/ruby-advisory-db/gems/private_address_check/CVE-2017-0909.yml +15 -0
- data/data/ruby-advisory-db/gems/private_address_check/CVE-2018-3759.yml +14 -0
- data/data/ruby-advisory-db/gems/puma/CVE-2019-16770.yml +21 -0
- data/data/ruby-advisory-db/gems/puma/CVE-2020-11076.yml +22 -0
- data/data/ruby-advisory-db/gems/puma/CVE-2020-11077.yml +31 -0
- data/data/ruby-advisory-db/gems/puma/CVE-2020-5247.yml +25 -0
- data/data/ruby-advisory-db/gems/puma/CVE-2020-5249.yml +36 -0
- data/data/ruby-advisory-db/gems/quick_magick/OSVDB-106954.yml +7 -0
- data/data/ruby-advisory-db/gems/rack-attack/OSVDB-132234.yml +26 -0
- data/data/ruby-advisory-db/gems/rack-cache/CVE-2012-2671.yml +18 -0
- data/data/ruby-advisory-db/gems/rack-cors/CVE-2017-11173.yml +21 -0
- data/data/ruby-advisory-db/gems/rack-cors/CVE-2019-18978.yml +13 -0
- data/data/ruby-advisory-db/gems/rack-mini-profiler/CVE-2016-4442.yml +17 -0
- data/data/ruby-advisory-db/gems/rack-protection/CVE-2018-1000119.yml +18 -0
- data/data/ruby-advisory-db/gems/rack-protection/CVE-2018-7212.yml +12 -0
- data/data/ruby-advisory-db/gems/rack-ssl/CVE-2014-2538.yml +11 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2011-5036.yml +21 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2012-6109.yml +21 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2013-0183.yml +19 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2013-0184.yml +20 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2013-0262.yml +18 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2013-0263.yml +23 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2015-3225.yml +18 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2018-16470.yml +56 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2018-16471.yml +80 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2019-16782.yml +32 -0
- data/data/ruby-advisory-db/gems/rack/CVE-2020-8161.yml +32 -0
- data/data/ruby-advisory-db/gems/radiant/CVE-2018-5216.yml +12 -0
- data/data/ruby-advisory-db/gems/radiant/CVE-2018-7261.yml +13 -0
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7578.yml +47 -0
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7579.yml +75 -0
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2015-7580.yml +70 -0
- data/data/ruby-advisory-db/gems/rails-html-sanitizer/CVE-2018-3741.yml +20 -0
- data/data/ruby-advisory-db/gems/rails_admin/CVE-2016-10522.yml +21 -0
- data/data/ruby-advisory-db/gems/rails_admin/CVE-2017-12098.yml +22 -0
- data/data/ruby-advisory-db/gems/railties/CVE-2019-5420.yml +49 -0
- data/data/ruby-advisory-db/gems/rake/CVE-2020-8130.yml +18 -0
- data/data/ruby-advisory-db/gems/rbovirt/CVE-2014-0036.yml +20 -0
- data/data/ruby-advisory-db/gems/rdoc/CVE-2013-0256.yml +27 -0
- data/data/ruby-advisory-db/gems/recurly/CVE-2017-0905.yml +35 -0
- data/data/ruby-advisory-db/gems/redcarpet/CVE-2015-5147.yml +17 -0
- data/data/ruby-advisory-db/gems/redcarpet/OSVDB-120415.yml +16 -0
- data/data/ruby-advisory-db/gems/redis-namespace/OSVDB-96425.yml +15 -0
- data/data/ruby-advisory-db/gems/redis-store/CVE-2017-1000248.yml +17 -0
- data/data/ruby-advisory-db/gems/refile/OSVDB-120857.yml +16 -0
- data/data/ruby-advisory-db/gems/rest-client/CVE-2015-1820.yml +23 -0
- data/data/ruby-advisory-db/gems/rest-client/CVE-2015-3448.yml +15 -0
- data/data/ruby-advisory-db/gems/rest-client/CVE-2019-15224.yml +13 -0
- data/data/ruby-advisory-db/gems/restforce/CVE-2018-3777.yml +36 -0
- data/data/ruby-advisory-db/gems/rexical/CVE-2019-5477.yml +21 -0
- data/data/ruby-advisory-db/gems/rgpg/CVE-2013-4203.yml +15 -0
- data/data/ruby-advisory-db/gems/rubocop/CVE-2017-8418.yml +20 -0
- data/data/ruby-advisory-db/gems/ruby-openid/CVE-2019-11027.yml +16 -0
- data/data/ruby-advisory-db/gems/ruby-saml/CVE-2016-5697.yml +20 -0
- data/data/ruby-advisory-db/gems/ruby-saml/CVE-2017-11428.yml +27 -0
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-117903.yml +13 -0
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124383.yml +11 -0
- data/data/ruby-advisory-db/gems/ruby-saml/OSVDB-124991.yml +13 -0
- data/data/ruby-advisory-db/gems/ruby_parser-legacy/CVE-2019-18409.yml +16 -0
- data/data/ruby-advisory-db/gems/ruby_parser/CVE-2013-0162.yml +11 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2007-0469.yml +18 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2012-2125.yml +17 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2012-2126.yml +15 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2013-4287.yml +20 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2013-4363.yml +21 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2015-3900.yml +20 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2015-4020.yml +20 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2017-0899.yml +16 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2017-0900.yml +16 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2017-0901.yml +16 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2017-0902.yml +16 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2017-0903.yml +17 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8320.yml +21 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8321.yml +16 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8322.yml +16 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8323.yml +17 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8324.yml +18 -0
- data/data/ruby-advisory-db/gems/rubygems-update/CVE-2019-8325.yml +16 -0
- data/data/ruby-advisory-db/gems/rubyzip/CVE-2017-5946.yml +17 -0
- data/data/ruby-advisory-db/gems/rubyzip/CVE-2018-1000544.yml +19 -0
- data/data/ruby-advisory-db/gems/rubyzip/CVE-2019-16892.yml +13 -0
- data/data/ruby-advisory-db/gems/safemode/CVE-2016-3693.yml +13 -0
- data/data/ruby-advisory-db/gems/safemode/CVE-2017-7540.yml +16 -0
- data/data/ruby-advisory-db/gems/samlr/CVE-2018-20857.yml +16 -0
- data/data/ruby-advisory-db/gems/sanitize/CVE-2018-3740.yml +22 -0
- data/data/ruby-advisory-db/gems/screen_capture/OSVDB-107783.yml +7 -0
- data/data/ruby-advisory-db/gems/secure_headers/CVE-2020-5216.yml +52 -0
- data/data/ruby-advisory-db/gems/secure_headers/CVE-2020-5217.yml +42 -0
- data/data/ruby-advisory-db/gems/sentry-raven/CVE-2014-9490.yml +14 -0
- data/data/ruby-advisory-db/gems/sfpagent/CVE-2014-2888.yml +15 -0
- data/data/ruby-advisory-db/gems/show_in_browser/CVE-2013-2105.yml +8 -0
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126329.yml +12 -0
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126330.yml +10 -0
- data/data/ruby-advisory-db/gems/sidekiq-pro/OSVDB-126331.yml +14 -0
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125675.yml +9 -0
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125676.yml +14 -0
- data/data/ruby-advisory-db/gems/sidekiq/OSVDB-125678.yml +9 -0
- data/data/ruby-advisory-db/gems/simple_captcha2/CVE-2019-14282.yml +13 -0
- data/data/ruby-advisory-db/gems/simple_form/CVE-2019-16676.yml +15 -0
- data/data/ruby-advisory-db/gems/sinatra/CVE-2018-11627.yml +16 -0
- data/data/ruby-advisory-db/gems/sinatra/CVE-2018-7212.yml +19 -0
- data/data/ruby-advisory-db/gems/slanger/CVE-2019-1010306.yml +16 -0
- data/data/ruby-advisory-db/gems/smart_proxy_dynflow/CVE-2018-14643.yml +18 -0
- data/data/ruby-advisory-db/gems/sorcery/CVE-2020-11052.yml +27 -0
- data/data/ruby-advisory-db/gems/sounder/CVE-2013-5647.yml +14 -0
- data/data/ruby-advisory-db/gems/spina/CVE-2015-4619.yml +16 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-119205.yml +18 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-125699.yml +18 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-125701.yml +17 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-125712.yml +16 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-125713.yml +15 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-69098.yml +19 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-73751.yml +11 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-76011.yml +15 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-81505.yml +14 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-81506.yml +16 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-90865.yml +20 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +17 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +17 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +17 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +17 -0
- data/data/ruby-advisory-db/gems/spree_auth/OSVDB-90865.yml +16 -0
- data/data/ruby-advisory-db/gems/spree_auth_devise/OSVDB-90865.yml +20 -0
- data/data/ruby-advisory-db/gems/sprockets/CVE-2014-7819.yml +27 -0
- data/data/ruby-advisory-db/gems/sprockets/CVE-2018-3760.yml +23 -0
- data/data/ruby-advisory-db/gems/sprout/CVE-2013-6421.yml +16 -0
- data/data/ruby-advisory-db/gems/strong_password/CVE-2019-13354.yml +19 -0
- data/data/ruby-advisory-db/gems/sup/CVE-2013-4478.yml +14 -0
- data/data/ruby-advisory-db/gems/sup/CVE-2013-4479.yml +14 -0
- data/data/ruby-advisory-db/gems/thumbshooter/CVE-2013-1898.yml +9 -0
- data/data/ruby-advisory-db/gems/twitter-bootstrap-rails/OSVDB-109206.yml +22 -0
- data/data/ruby-advisory-db/gems/uglifier/OSVDB-126747.yml +19 -0
- data/data/ruby-advisory-db/gems/user_agent_parser/CVE-2020-5243.yml +28 -0
- data/data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml +22 -0
- data/data/ruby-advisory-db/gems/web-console/OSVDB-112346.yml +12 -0
- data/data/ruby-advisory-db/gems/webbynode/CVE-2013-7086.yml +12 -0
- data/data/ruby-advisory-db/gems/websocket-extensions/CVE-2020-7663.yml +35 -0
- data/data/ruby-advisory-db/gems/wicked/CVE-2013-4413.yml +14 -0
- data/data/ruby-advisory-db/gems/will_paginate/CVE-2013-6459.yml +15 -0
- data/data/ruby-advisory-db/gems/xaviershay-dm-rails/CVE-2015-2179.yml +13 -0
- data/data/ruby-advisory-db/gems/yajl-ruby/CVE-2017-16516.yml +19 -0
- data/data/ruby-advisory-db/gems/yard/CVE-2017-17042.yml +16 -0
- data/data/ruby-advisory-db/gems/yard/CVE-2019-1020001.yml +17 -0
- data/data/ruby-advisory-db/gems/yard/GHSA-xfhh-rx56-rxcr.yml +12 -0
- data/data/ruby-advisory-db/lib/cf_scrape.py +5 -0
- data/data/ruby-advisory-db/lib/github_advisory_sync.rb +296 -0
- data/data/ruby-advisory-db/libraries/rubygems +1 -0
- data/data/ruby-advisory-db/rubies/jruby/CVE-2010-1330.yml +17 -0
- data/data/ruby-advisory-db/rubies/jruby/CVE-2011-4838.yml +15 -0
- data/data/ruby-advisory-db/rubies/jruby/CVE-2012-5370.yml +17 -0
- data/data/ruby-advisory-db/rubies/jruby/OSVDB-94644.yml +12 -0
- data/data/ruby-advisory-db/rubies/rbx/CVE-2012-5372.yml +17 -0
- data/data/ruby-advisory-db/rubies/rbx/OSVDB-78119.yml +13 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5162.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2007-5770.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1447.yml +15 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-1891.yml +21 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2376.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2662.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2663.yml +21 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2664.yml +21 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2725.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-2726.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3443.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3655.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3656.yml +19 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3657.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3790.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2008-3905.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-0642.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-1904.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-4124.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-4492.yml +20 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2009-5147.yml +13 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2010-0541.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2010-2489.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-0188.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-1004.yml +20 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-1005.yml +15 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-2705.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-3009.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-3389.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2011-4815.yml +14 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4464.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4466.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4481.yml +15 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-4522.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2012-5371.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2013-1821.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2013-2065.yml +19 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2013-4073.yml +21 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2013-4164.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2014-2525.yml +20 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2014-3916.yml +16 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2014-4975.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2014-8080.yml +19 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2014-8090.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2015-1855.yml +17 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml +19 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2015-9096.yml +20 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-0898.yml +19 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-10784.yml +25 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-14033.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-14064.yml +20 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-17405.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2017-17742.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-16395.yml +36 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-16396.yml +26 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-6914.yml +27 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-8777.yml +21 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-8778.yml +20 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-8779.yml +28 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2018-8780.yml +22 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2019-15845.yml +18 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2019-16201.yml +15 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2019-16254.yml +19 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2019-16255.yml +20 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2020-10663.yml +29 -0
- data/data/ruby-advisory-db/rubies/ruby/CVE-2020-10933.yml +25 -0
- data/data/ruby-advisory-db/scripts/post-advisories.sh +18 -0
- data/data/ruby-advisory-db/spec/advisories_spec.rb +23 -0
- data/data/ruby-advisory-db/spec/advisory_example.rb +228 -0
- data/data/ruby-advisory-db/spec/gem_example.rb +44 -0
- data/data/ruby-advisory-db/spec/library_example.rb +21 -0
- data/data/ruby-advisory-db/spec/ruby_example.rb +29 -0
- data/data/ruby-advisory-db/spec/schemas/gem.yml +71 -0
- data/data/ruby-advisory-db/spec/schemas/ruby.yml +36 -0
- data/data/ruby-advisory-db/spec/spec_helper.rb +2 -0
- data/lib/bundler/audit/version.rb +1 -1
- metadata +550 -3
@@ -0,0 +1,25 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2012-2661
|
5
|
+
osvdb: 82403
|
6
|
+
url: https://nvd.nist.gov/vuln/detail/CVE-2012-2661
|
7
|
+
title: Ruby on Rails where Method ActiveRecord Class SQL Injection
|
8
|
+
date: 2012-05-31
|
9
|
+
|
10
|
+
description: |
|
11
|
+
Ruby on Rails (RoR) contains a flaw that may allow an attacker to carry out
|
12
|
+
an SQL injection attack. The issue is due to the ActiveRecord class not
|
13
|
+
properly sanitizing user-supplied input to the 'where' method. This may
|
14
|
+
allow an attacker to inject or manipulate SQL queries in an application
|
15
|
+
built on RoR, allowing for the manipulation or disclosure of arbitrary data.
|
16
|
+
|
17
|
+
cvss_v2: 5.0
|
18
|
+
|
19
|
+
unaffected_versions:
|
20
|
+
- ~> 2.3.14
|
21
|
+
|
22
|
+
patched_versions:
|
23
|
+
- ~> 3.0.13
|
24
|
+
- ~> 3.1.5
|
25
|
+
- ">= 3.2.4"
|
@@ -0,0 +1,24 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-0155
|
5
|
+
osvdb: 89025
|
6
|
+
url: https://nvd.nist.gov/vuln/detail/CVE-2013-0155
|
7
|
+
title: Ruby on Rails Active Record JSON Parameter Parsing Query Bypass
|
8
|
+
date: 2013-01-08
|
9
|
+
|
10
|
+
description: |
|
11
|
+
Ruby on Rails contains a flaw in the Active Record. The issue is due to an
|
12
|
+
error with the way the Active Record handles parameters combined with an
|
13
|
+
error during the parsing of the JSON parameters. This may allow a remote
|
14
|
+
attacker to bypass restrictions abd issue unexpected database queries with
|
15
|
+
"IS NULL" or empty where clauses, and forcing the query to unexpectedly check
|
16
|
+
for NULL or eliminate a WHERE clause.
|
17
|
+
|
18
|
+
cvss_v2: 10.0
|
19
|
+
|
20
|
+
patched_versions:
|
21
|
+
- ~> 2.3.16
|
22
|
+
- ~> 3.0.19
|
23
|
+
- ~> 3.1.10
|
24
|
+
- ">= 3.2.11"
|
@@ -0,0 +1,21 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-0276
|
5
|
+
osvdb: 90072
|
6
|
+
url: https://nvd.nist.gov/vuln/detail/CVE-2013-0276
|
7
|
+
title: Ruby on Rails Active Record attr_protected Method Bypass
|
8
|
+
date: 2013-02-11
|
9
|
+
|
10
|
+
description: |
|
11
|
+
Ruby on Rails contains a flaw in the attr_protected method of the
|
12
|
+
Active Record. The issue is triggered during the handling of a specially
|
13
|
+
crafted request, which may allow a remote attacker to bypass protection
|
14
|
+
mechanisms and alter values that would otherwise be protected.
|
15
|
+
|
16
|
+
cvss_v2: 5.0
|
17
|
+
|
18
|
+
patched_versions:
|
19
|
+
- "~> 2.3.17"
|
20
|
+
- "~> 3.1.11"
|
21
|
+
- ">= 3.2.12"
|
@@ -0,0 +1,23 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-0277
|
5
|
+
osvdb: 90073
|
6
|
+
url: https://nvd.nist.gov/vuln/detail/CVE-2013-0277
|
7
|
+
title: |
|
8
|
+
Ruby on Rails Active Record +serialize+ Helper YAML Attribute Handling Remote
|
9
|
+
Code Execution
|
10
|
+
date: 2013-02-11
|
11
|
+
|
12
|
+
description: |
|
13
|
+
Ruby on Rails contains a flaw in the +serialize+ helper in the Active Record.
|
14
|
+
The issue is triggered when the system is configured to allow users to
|
15
|
+
directly provide values to be serialized and deserialized using YAML.
|
16
|
+
With a specially crafted YAML attribute, a remote attacker can deserialize
|
17
|
+
arbitrary YAML and execute code associated with it.
|
18
|
+
|
19
|
+
cvss_v2: 10.0
|
20
|
+
|
21
|
+
patched_versions:
|
22
|
+
- "~> 2.3.17"
|
23
|
+
- ">= 3.1.0"
|
@@ -0,0 +1,26 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-1854
|
5
|
+
osvdb: 91453
|
6
|
+
url: https://nvd.nist.gov/vuln/detail/CVE-2013-1854
|
7
|
+
title: Symbol DoS vulnerability in Active Record
|
8
|
+
date: 2013-03-19
|
9
|
+
|
10
|
+
description: |
|
11
|
+
When a hash is provided as the find value for a query, the keys of
|
12
|
+
the hash may be converted to symbols. Carefully crafted requests can
|
13
|
+
coerce `params[:name]` to return a hash, and the keys to that hash
|
14
|
+
may be converted to symbols. Ruby symbols are not garbage collected,
|
15
|
+
so an attacker can initiate a denial of service attack by creating a
|
16
|
+
large number of symbols.
|
17
|
+
|
18
|
+
cvss_v2: 7.8
|
19
|
+
|
20
|
+
unaffected_versions:
|
21
|
+
- ~> 3.0.0
|
22
|
+
|
23
|
+
patched_versions:
|
24
|
+
- ~> 2.3.18
|
25
|
+
- ~> 3.1.12
|
26
|
+
- ">= 3.2.13"
|
@@ -0,0 +1,23 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2014-0080
|
5
|
+
osvdb: 103438
|
6
|
+
url: https://nvd.nist.gov/vuln/detail/CVE-2014-0080
|
7
|
+
title: Data Injection Vulnerability in Active Record
|
8
|
+
date: 2014-02-18
|
9
|
+
|
10
|
+
description: |
|
11
|
+
Ruby on Rails contains a flaw in connection_adapters/postgresql/cast.rb
|
12
|
+
in Active Record. This issue may allow a remote attacker to inject data
|
13
|
+
into PostgreSQL array columns via a specially crafted string.
|
14
|
+
|
15
|
+
cvss_v2:
|
16
|
+
|
17
|
+
unaffected_versions:
|
18
|
+
- "< 3.2.0"
|
19
|
+
- ~> 3.2.0
|
20
|
+
|
21
|
+
patched_versions:
|
22
|
+
- ~> 4.0.3
|
23
|
+
- ">= 4.1.0.beta2"
|
@@ -0,0 +1,23 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2014-3482
|
5
|
+
osvdb: 108664
|
6
|
+
url: https://nvd.nist.gov/vuln/detail/CVE-2014-3482
|
7
|
+
title: SQL Injection Vulnerability in Active Record
|
8
|
+
date: 2014-07-02
|
9
|
+
|
10
|
+
description: |
|
11
|
+
Ruby on Rails contains a flaw that may allow carrying out an SQL injection attack.
|
12
|
+
The issue is due to the PostgreSQL adapter for Active Record not properly
|
13
|
+
sanitizing user-supplied input when quoting bitstring. This may allow a remote
|
14
|
+
attacker to inject or manipulate SQL queries in the back-end database,
|
15
|
+
allowing for the manipulation or disclosure of arbitrary data.
|
16
|
+
|
17
|
+
cvss_v2:
|
18
|
+
|
19
|
+
unaffected_versions:
|
20
|
+
- ">= 4.0.0"
|
21
|
+
|
22
|
+
patched_versions:
|
23
|
+
- ~> 3.2.19
|
@@ -0,0 +1,24 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2014-3483
|
5
|
+
osvdb: 108665
|
6
|
+
url: https://nvd.nist.gov/vuln/detail/CVE-2014-3483
|
7
|
+
title: SQL Injection Vulnerability in Active Record
|
8
|
+
date: 2014-07-02
|
9
|
+
|
10
|
+
description: |
|
11
|
+
Ruby on Rails contains a flaw that may allow carrying out an SQL injection attack.
|
12
|
+
The issue is due to the PostgreSQL adapter for Active Record not properly
|
13
|
+
sanitizing user-supplied input when quoting ranges. This may allow a remote
|
14
|
+
attacker to inject or manipulate SQL queries in the back-end database,
|
15
|
+
allowing for the manipulation or disclosure of arbitrary data.
|
16
|
+
|
17
|
+
cvss_v2:
|
18
|
+
|
19
|
+
unaffected_versions:
|
20
|
+
- "< 4.0.0"
|
21
|
+
|
22
|
+
patched_versions:
|
23
|
+
- ~> 4.0.7
|
24
|
+
- ">= 4.1.3"
|
@@ -0,0 +1,23 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2014-3514
|
5
|
+
url: https://groups.google.com/forum/#!msg/rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ
|
6
|
+
title: Data Injection Vulnerability in Active Record
|
7
|
+
date: 2014-08-18
|
8
|
+
|
9
|
+
description: >-
|
10
|
+
The create_with functionality in Active Record was implemented
|
11
|
+
incorrectly and completely bypasses the strong parameters
|
12
|
+
protection. Applications which pass user-controlled values to
|
13
|
+
create_with could allow attackers to set arbitrary attributes on
|
14
|
+
models.
|
15
|
+
|
16
|
+
cvss_v2: 8.7
|
17
|
+
|
18
|
+
unaffected_versions:
|
19
|
+
- "< 4.0.0"
|
20
|
+
|
21
|
+
patched_versions:
|
22
|
+
- ~> 4.0.9
|
23
|
+
- ">= 4.1.5"
|
@@ -0,0 +1,110 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2015-7577
|
5
|
+
date: 2016-01-25
|
6
|
+
url: https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g
|
7
|
+
|
8
|
+
title: Nested attributes rejection proc bypass in Active Record
|
9
|
+
|
10
|
+
description: |
|
11
|
+
There is a vulnerability in how the nested attributes feature in Active Record
|
12
|
+
handles updates in combination with destroy flags when destroying records is
|
13
|
+
disabled. This vulnerability has been assigned the CVE identifier CVE-2015-7577.
|
14
|
+
|
15
|
+
Versions Affected: 3.1.0 and newer
|
16
|
+
Not affected: 3.0.x and older
|
17
|
+
Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1
|
18
|
+
|
19
|
+
Impact
|
20
|
+
------
|
21
|
+
When using the nested attributes feature in Active Record you can prevent the
|
22
|
+
destruction of associated records by passing the `allow_destroy: false` option
|
23
|
+
to the `accepts_nested_attributes_for` method. However due to a change in the
|
24
|
+
commit [a9b4b5d][1] the `_destroy` flag prevents the `:reject_if` proc from
|
25
|
+
being called because it assumes that the record will be destroyed anyway.
|
26
|
+
|
27
|
+
However this isn't true if `:allow_destroy` is false so this leads to changes
|
28
|
+
that would have been rejected being applied to the record. Attackers could use
|
29
|
+
this do things like set attributes to invalid values and to clear all of the
|
30
|
+
attributes amongst other things. The severity will be dependent on how the
|
31
|
+
application has used this feature.
|
32
|
+
|
33
|
+
All users running an affected release should either upgrade or use one of
|
34
|
+
the workarounds immediately.
|
35
|
+
|
36
|
+
Releases
|
37
|
+
--------
|
38
|
+
The FIXED releases are available at the normal locations.
|
39
|
+
|
40
|
+
Workarounds
|
41
|
+
-----------
|
42
|
+
If you can't upgrade, please use the following monkey patch in an initializer
|
43
|
+
that is loaded before your application:
|
44
|
+
|
45
|
+
```
|
46
|
+
$ cat config/initializers/nested_attributes_bypass_fix.rb
|
47
|
+
module ActiveRecord
|
48
|
+
module NestedAttributes
|
49
|
+
private
|
50
|
+
|
51
|
+
def reject_new_record?(association_name, attributes)
|
52
|
+
will_be_destroyed?(association_name, attributes) || call_reject_if(association_name, attributes)
|
53
|
+
end
|
54
|
+
|
55
|
+
def call_reject_if(association_name, attributes)
|
56
|
+
return false if will_be_destroyed?(association_name, attributes)
|
57
|
+
|
58
|
+
case callback = self.nested_attributes_options[association_name][:reject_if]
|
59
|
+
when Symbol
|
60
|
+
method(callback).arity == 0 ? send(callback) : send(callback, attributes)
|
61
|
+
when Proc
|
62
|
+
callback.call(attributes)
|
63
|
+
end
|
64
|
+
end
|
65
|
+
|
66
|
+
def will_be_destroyed?(association_name, attributes)
|
67
|
+
allow_destroy?(association_name) && has_destroy_flag?(attributes)
|
68
|
+
end
|
69
|
+
|
70
|
+
def allow_destroy?(association_name)
|
71
|
+
self.nested_attributes_options[association_name][:allow_destroy]
|
72
|
+
end
|
73
|
+
end
|
74
|
+
end
|
75
|
+
```
|
76
|
+
|
77
|
+
Patches
|
78
|
+
-------
|
79
|
+
To aid users who aren't able to upgrade immediately we have provided patches for
|
80
|
+
the two supported release series. They are in git-am format and consist of a
|
81
|
+
single changeset.
|
82
|
+
|
83
|
+
* 3-2-nested-attributes-reject-if-bypass.patch - Patch for 3.2 series
|
84
|
+
* 4-1-nested-attributes-reject-if-bypass.patch - Patch for 4.1 series
|
85
|
+
* 4-2-nested-attributes-reject-if-bypass.patch - Patch for 4.2 series
|
86
|
+
* 5-0-nested-attributes-reject-if-bypass.patch - Patch for 5.0 series
|
87
|
+
|
88
|
+
Please note that only the 4.1.x and 4.2.x series are supported at present. Users
|
89
|
+
of earlier unsupported releases are advised to upgrade as soon as possible as we
|
90
|
+
cannot guarantee the continued availability of security fixes for unsupported
|
91
|
+
releases.
|
92
|
+
|
93
|
+
Credits
|
94
|
+
-------
|
95
|
+
Thank you to Justin Coyne for reporting the problem and working with us to fix it.
|
96
|
+
|
97
|
+
[1]: https://github.com/rails/rails/commit/a9b4b5da7c216e4464eeb9dbd0a39ea258d64325
|
98
|
+
|
99
|
+
cvss_v2: 5.0
|
100
|
+
cvss_v3: 5.3
|
101
|
+
|
102
|
+
unaffected_versions:
|
103
|
+
- "~> 3.0.0"
|
104
|
+
- "< 3.0.0"
|
105
|
+
|
106
|
+
patched_versions:
|
107
|
+
- ">= 5.0.0.beta1.1"
|
108
|
+
- "~> 4.2.5, >= 4.2.5.1"
|
109
|
+
- "~> 4.1.14, >= 4.1.14.1"
|
110
|
+
- "~> 3.2.22.1"
|
@@ -0,0 +1,73 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2016-6317
|
5
|
+
date: 2016-08-11
|
6
|
+
url: https://groups.google.com/forum/#!topic/rubyonrails-security/rgO20zYW33s
|
7
|
+
|
8
|
+
title: Unsafe Query Generation Risk in Active Record
|
9
|
+
|
10
|
+
description: |
|
11
|
+
There is a vulnerability when Active Record is used in conjunction with JSON
|
12
|
+
parameter parsing. This vulnerability is similar to CVE-2012-2660,
|
13
|
+
CVE-2012-2694 and CVE-2013-0155.
|
14
|
+
|
15
|
+
Impact
|
16
|
+
------
|
17
|
+
|
18
|
+
Due to the way Active Record interprets parameters in combination with the way
|
19
|
+
that JSON parameters are parsed, it is possible for an attacker to issue
|
20
|
+
unexpected database queries with "IS NULL" or empty where clauses. This issue
|
21
|
+
does *not* let an attacker insert arbitrary values into an SQL query, however
|
22
|
+
they can cause the query to check for NULL or eliminate a WHERE clause when
|
23
|
+
most users wouldn't expect it.
|
24
|
+
|
25
|
+
For example, a system has password reset with token functionality:
|
26
|
+
|
27
|
+
```ruby
|
28
|
+
unless params[:token].nil?
|
29
|
+
user = User.find_by_token(params[:token])
|
30
|
+
user.reset_password!
|
31
|
+
end
|
32
|
+
```
|
33
|
+
|
34
|
+
An attacker can craft a request such that `params[:token]` will return
|
35
|
+
`[nil]`. The `[nil]` value will bypass the test for nil, but will still add
|
36
|
+
an "IN ('xyz', NULL)" clause to the SQL query.
|
37
|
+
|
38
|
+
Similarly, an attacker can craft a request such that `params[:token]` will
|
39
|
+
return an empty hash. An empty hash will eliminate the WHERE clause of the
|
40
|
+
query, but can bypass the `nil?` check.
|
41
|
+
|
42
|
+
Note that this impacts not only dynamic finders (`find_by_*`) but also
|
43
|
+
relations (`User.where(:name => params[:name])`).
|
44
|
+
|
45
|
+
All users running an affected release should either upgrade or use one of the
|
46
|
+
work arounds immediately. All users running an affected release should upgrade
|
47
|
+
immediately. Please note, this vulnerability is a variant of CVE-2012-2660,
|
48
|
+
CVE-2012-2694, and CVE-2013-0155. Even if you upgraded to address those
|
49
|
+
issues, you must take action again.
|
50
|
+
|
51
|
+
If this chance in behavior impacts your application, you can manually decode
|
52
|
+
the original values from the request like so:
|
53
|
+
|
54
|
+
`ActiveSupport::JSON.decode(request.body)`
|
55
|
+
|
56
|
+
Workarounds
|
57
|
+
-----------
|
58
|
+
This problem can be mitigated by casting the parameter to a string before
|
59
|
+
passing it to Active Record. For example:
|
60
|
+
|
61
|
+
```ruby
|
62
|
+
unless params[:token].nil? || params[:token].to_s.empty?
|
63
|
+
user = User.find_by_token(params[:token].to_s)
|
64
|
+
user.reset_password!
|
65
|
+
end
|
66
|
+
```
|
67
|
+
|
68
|
+
unaffected_versions:
|
69
|
+
- "< 4.2.0"
|
70
|
+
- ">= 5.0.0"
|
71
|
+
|
72
|
+
patched_versions:
|
73
|
+
- ">= 4.2.7.1"
|
@@ -0,0 +1,20 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2012-6496
|
5
|
+
osvdb: 88661
|
6
|
+
url: https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/DCNTNp_qjFM
|
7
|
+
title: Ruby on Rails find_by_* Methods Authlogic SQL Injection Bypass
|
8
|
+
date: 2012-12-22
|
9
|
+
|
10
|
+
description: |
|
11
|
+
Due to the way dynamic finders in Active Record extract options from method
|
12
|
+
parameters, a method parameter can mistakenly be used as a scope. Carefully
|
13
|
+
crafted requests can use the scope to inject arbitrary SQL.
|
14
|
+
|
15
|
+
cvss_v2: 6.4
|
16
|
+
|
17
|
+
patched_versions:
|
18
|
+
- ~> 3.0.18
|
19
|
+
- ~> 3.1.9
|
20
|
+
- ">= 3.2.10"
|
@@ -0,0 +1,48 @@
|
|
1
|
+
---
|
2
|
+
gem: activeresource
|
3
|
+
cve: 2020-8151
|
4
|
+
url: https://groups.google.com/forum/#!topic/rubyonrails-security/pktoF4VmiM8
|
5
|
+
title: activeresource Gem for Ruby lib/active_resource/base.rb element_path Lack of Encoding
|
6
|
+
date: 2020-05-05
|
7
|
+
description: |
|
8
|
+
activeresource contains a lack of encoding flaw in the element_path function of
|
9
|
+
lib/active_resource/base.rb.
|
10
|
+
|
11
|
+
There is an issue with the way Active Resource encodes data before querying the back end server. This encoding mechanism can allow specially crafted requests to possibly access data that may not be expected.
|
12
|
+
|
13
|
+
Impacted code will look something like this:
|
14
|
+
|
15
|
+
```
|
16
|
+
require 'activeresource'
|
17
|
+
|
18
|
+
class Test < ActiveResource::Base
|
19
|
+
self.site = 'http://127.0.0.1:3000'
|
20
|
+
end
|
21
|
+
|
22
|
+
Test.exists?(untrusted_user_input)
|
23
|
+
```
|
24
|
+
|
25
|
+
Where untrusted user input is passed to an Active Resource model. Specially crafted untrusted input can cause Active Resource to access data in an unexpected way and possibly leak information.
|
26
|
+
|
27
|
+
Workarounds
|
28
|
+
-------------
|
29
|
+
|
30
|
+
For those that can't upgrade, the following monkey patch can be applied:
|
31
|
+
|
32
|
+
```
|
33
|
+
module ActiveResource
|
34
|
+
class Base
|
35
|
+
class << self
|
36
|
+
def element_path(id, prefix_options = {}, query_options = nil)
|
37
|
+
check_prefix_options(prefix_options)
|
38
|
+
|
39
|
+
prefix_options, query_options = split_options(prefix_options) if query_options.nil?
|
40
|
+
"#{prefix(prefix_options)}#{collection_name}/#{URI.encode_www_form_component(id.to_s)}#{format_extension}#{query_string(query_options)}"
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
44
|
+
end
|
45
|
+
```
|
46
|
+
|
47
|
+
patched_versions:
|
48
|
+
- ">= 5.1.1"
|