bundler-audit 0.1.2 → 0.2.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (84) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +1 -1
  3. data/ChangeLog.md +10 -0
  4. data/Gemfile +1 -1
  5. data/README.md +50 -34
  6. data/Rakefile +15 -2
  7. data/data/ruby-advisory-db/CONTRIBUTING.md +6 -0
  8. data/data/ruby-advisory-db/CONTRIBUTORS.md +13 -0
  9. data/data/ruby-advisory-db/Gemfile +3 -0
  10. data/data/ruby-advisory-db/LICENSE.txt +5 -0
  11. data/data/ruby-advisory-db/README.md +29 -7
  12. data/data/ruby-advisory-db/Rakefile +27 -0
  13. data/data/ruby-advisory-db/gems/actionpack/{2012-1099.yml → OSVDB-79727.yml} +3 -0
  14. data/data/ruby-advisory-db/gems/actionpack/{2012-3424.yml → OSVDB-84243.yml} +7 -0
  15. data/data/ruby-advisory-db/gems/actionpack/{2012-3465.yml → OSVDB-84513.yml} +3 -0
  16. data/data/ruby-advisory-db/gems/actionpack/{2012-3463.yml → OSVDB-84515.yml} +6 -0
  17. data/data/ruby-advisory-db/gems/actionpack/{2013-0156.yml → OSVDB-89026.yml} +3 -0
  18. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +20 -0
  19. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +23 -0
  20. data/data/ruby-advisory-db/gems/activerecord/{2012-2661.yml → OSVDB-82403.yml} +6 -0
  21. data/data/ruby-advisory-db/gems/activerecord/{2012-2660.yml → OSVDB-82610.yml} +3 -0
  22. data/data/ruby-advisory-db/gems/activerecord/{2013-0155.yml → OSVDB-89025.yml} +3 -0
  23. data/data/ruby-advisory-db/gems/activerecord/{2013-0276.yml → OSVDB-90072.yml} +3 -0
  24. data/data/ruby-advisory-db/gems/activerecord/{2013-0277.yml → OSVDB-90073.yml} +3 -0
  25. data/data/ruby-advisory-db/gems/activerecord/OSVDB-91453.yml +26 -0
  26. data/data/ruby-advisory-db/gems/activesupport/{2012-1098.yml → OSVDB-79726.yml} +6 -0
  27. data/data/ruby-advisory-db/gems/activesupport/{2012-3464.yml → OSVDB-84516.yml} +3 -0
  28. data/data/ruby-advisory-db/gems/activesupport/{2013-0333.yml → OSVDB-89594.yml} +3 -0
  29. data/data/ruby-advisory-db/gems/activesupport/OSVDB-91451.yml +28 -0
  30. data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +10 -0
  31. data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +17 -0
  32. data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +11 -0
  33. data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +12 -0
  34. data/data/ruby-advisory-db/gems/devise/{2013-0233.yml → OSVDB-89642.yml} +2 -0
  35. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +19 -0
  36. data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +9 -0
  37. data/data/ruby-advisory-db/gems/extlib/OSVDB-90740.yml +18 -0
  38. data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +12 -0
  39. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +10 -0
  40. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +10 -0
  41. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +10 -0
  42. data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +9 -0
  43. data/data/ruby-advisory-db/gems/ftpd/OSVDB-90784.yml +18 -0
  44. data/data/ruby-advisory-db/gems/gtk2/{2007-6183.yml → OSVDB-40774.yml} +2 -0
  45. data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +19 -0
  46. data/data/ruby-advisory-db/gems/json/{2013-0269.yml → OSVDB-90074.yml} +4 -2
  47. data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +10 -0
  48. data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +10 -0
  49. data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +10 -0
  50. data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +21 -0
  51. data/data/ruby-advisory-db/gems/mail/{2011-0739.yml → OSVDB-70667.yml} +2 -0
  52. data/data/ruby-advisory-db/gems/mail/{2012-2139.yml → OSVDB-81631.yml} +3 -0
  53. data/data/ruby-advisory-db/gems/mail/{2012-2140.yml → OSVDB-81632.yml} +7 -2
  54. data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +10 -0
  55. data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +15 -0
  56. data/data/ruby-advisory-db/gems/multi_xml/{2013-0175.yml → OSVDB-89148.yml} +2 -0
  57. data/data/ruby-advisory-db/gems/newrelic_rpm/{2013-0284.yml → OSVDB-90189.yml} +4 -2
  58. data/data/ruby-advisory-db/gems/nori/{2013-0285.yml → OSVDB-90196.yml} +4 -2
  59. data/data/ruby-advisory-db/gems/omniauth-oauth2/{2012-6134.yml → OSVDB-90264.yml} +4 -2
  60. data/data/ruby-advisory-db/gems/pdfkit/OSVDB-90867.yml +11 -0
  61. data/data/ruby-advisory-db/gems/rack-cache/{2012-267.yml → OSVDB-83077.yml} +3 -1
  62. data/data/ruby-advisory-db/gems/rack/{2013-0263.yml → OSVDB-89939.yml} +2 -0
  63. data/data/ruby-advisory-db/gems/rdoc/{2013-0256.yml → OSVDB-90004.yml} +2 -0
  64. data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +13 -0
  65. data/data/ruby-advisory-db/gems/ruby_parser/OSVDB-90561.yml +11 -0
  66. data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +10 -0
  67. data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +10 -0
  68. data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +10 -0
  69. data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +10 -0
  70. data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +10 -0
  71. data/data/ruby-advisory-db/lib/scrape.rb +87 -0
  72. data/data/ruby-advisory-db/spec/advisory_example.rb +97 -12
  73. data/gemspec.yml +3 -1
  74. data/lib/bundler/audit/advisory.rb +46 -16
  75. data/lib/bundler/audit/cli.rb +23 -19
  76. data/lib/bundler/audit/scanner.rb +97 -0
  77. data/lib/bundler/audit/version.rb +1 -1
  78. data/spec/advisory_spec.rb +66 -6
  79. data/spec/bundle/insecure_sources/Gemfile +39 -0
  80. data/spec/bundle/secure/Gemfile +1 -1
  81. data/spec/bundle/{vuln → unpatched_gems}/Gemfile +0 -0
  82. data/spec/integration_spec.rb +75 -6
  83. data/spec/scanner_spec.rb +74 -0
  84. metadata +77 -40
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: 0a34b6a79c055b51422c7c3225428947ca6b587e
4
+ data.tar.gz: 724414726507e87d679a561759e9dcbdd90aecfc
5
+ SHA512:
6
+ metadata.gz: b3c59aadb9c0f2ed1b8d3a91bf6866e54295ed78105531ff1362c5ef65f264ac02699c53d3e8e3d08f025ebc9e38ef5917de4fa9906b66e2e209131a14665e42
7
+ data.tar.gz: f82127fe64b6bb856483ee82f5ab642fee371d4c84695e05beef44414857e4c95dd7f5a1e27244af9b2c81e9364a16027bb333ab123a547ab1a9bf6654a5f3df
data/.gitignore CHANGED
@@ -2,4 +2,4 @@ Gemfile.lock
2
2
  doc/
3
3
  pkg/
4
4
  spec/bundle/*/Gemfile.lock
5
- vendor/cache/*.gem
5
+ vendor/bundle/
@@ -1,3 +1,13 @@
1
+ ### 0.2.0 / 2013-03-05
2
+
3
+ * Require RubyGems >= 1.8.0. Prior versions of RubyGems could not correctly
4
+ parse approximate version requirements (`~> 1.2.3`).
5
+ * Updated the [ruby-advisory-db].
6
+ * Added {Bundle::Audit::Advisory#unaffected_versions}.
7
+ * Added {Bundle::Audit::Advisory#unaffected?}.
8
+ * Added {Bundle::Audit::Advisory#patched?}.
9
+ * Renamed `Advisory#cve` to {Bundle::Audit::Advisory#id}.
10
+
1
11
  ### 0.1.2 / 2013-02-17
2
12
 
3
13
  * Require [bundler] ~> 1.2.
data/Gemfile CHANGED
@@ -1,4 +1,4 @@
1
- source :rubygems
1
+ source 'https://rubygems.org/'
2
2
 
3
3
  gemspec
4
4
 
data/README.md CHANGED
@@ -1,11 +1,11 @@
1
1
  # bundler-audit
2
2
 
3
- * [Homepage](https://github.com/postmodern/bundler-audit#readme)
4
- * [Issues](https://github.com/postmodern/bundler-audit/issues)
3
+ * [Homepage](https://github.com/rubysec/bundler-audit#readme)
4
+ * [Issues](https://github.com/rubysec/bundler-audit/issues)
5
5
  * [Documentation](http://rubydoc.info/gems/bundler-audit/frames)
6
- * [Email](mailto:postmodern.mod3 at gmail.com)
7
- * [![Build Status](https://travis-ci.org/postmodern/bundler-audit.png)](https://travis-ci.org/postmodern/bundler-audit)
8
-
6
+ * [Email](mailto:rubysec.mod3 at gmail.com)
7
+ * [![Build Status](https://travis-ci.org/rubysec/bundler-audit.png)](https://travis-ci.org/rubysec/bundler-audit)
8
+ * [![Code Climate](https://codeclimate.com/github/rubysec/bundler-audit.png)](https://codeclimate.com/github/rubysec/bundler-audit)
9
9
 
10
10
  ## Description
11
11
 
@@ -14,6 +14,8 @@ Patch-level verification for [Bundler][bundler].
14
14
  ## Features
15
15
 
16
16
  * Checks for vulnerable versions of gems in `Gemfile.lock`.
17
+ * Checks for insecure gem sources (`http://`).
18
+ * Allows ignoring certain advisories that have been manually worked around.
17
19
  * Prints advisory information.
18
20
  * Does not require a network connection.
19
21
 
@@ -21,47 +23,61 @@ Patch-level verification for [Bundler][bundler].
21
23
 
22
24
  Audit a projects `Gemfile.lock`:
23
25
 
24
- $ bundle-audit
25
- Name: rack
26
- Version: 1.4.4
27
- CVE: 2013-0263
28
- Criticality: High
29
- URL: http://osvdb.org/show/osvdb/89939
30
- Title: Rack Rack::Session::Cookie Function Timing Attack Remote Code Execution
31
- Patched Versions: ~> 1.1.6, ~> 1.2.8, ~> 1.3.10, ~> 1.4.5, >= 1.5.2
26
+ Name: actionpack
27
+ Version: 3.2.10
28
+ Advisory: OSVDB-91452
29
+ Criticality: Medium
30
+ URL: http://www.osvdb.org/show/osvdb/91452
31
+ Title: XSS vulnerability in sanitize_css in Action Pack
32
+ Solution: upgrade to ~> 2.3.18, ~> 3.1.12, >= 3.2.13
32
33
 
33
- Name: json
34
- Version: 1.7.6
35
- CVE: 2013-0269
36
- Criticality: High
37
- URL: http://direct.osvdb.org/show/osvdb/90074
38
- Title: Ruby on Rails JSON Gem Arbitrary Symbol Creation Remote DoS
39
- Patched Versions: ~> 1.5.4, ~> 1.6.7, >= 1.7.7
34
+ Name: actionpack
35
+ Version: 3.2.10
36
+ Advisory: OSVDB-91454
37
+ Criticality: Medium
38
+ URL: http://osvdb.org/show/osvdb/91454
39
+ Title: XSS Vulnerability in the `sanitize` helper of Ruby on Rails
40
+ Solution: upgrade to ~> 2.3.18, ~> 3.1.12, >= 3.2.13
40
41
 
41
- Name: rails
42
+ Name: actionpack
42
43
  Version: 3.2.10
43
- CVE: 2013-0155
44
+ Advisory: OSVDB-89026
44
45
  Criticality: High
45
- URL: http://osvdb.org/show/osvdb/89025
46
- Title: Ruby on Rails Active Record JSON Parameter Parsing Query Bypass
47
- Patched Versions: ~> 3.0.19, ~> 3.1.10, >= 3.2.11
46
+ URL: http://osvdb.org/show/osvdb/89026
47
+ Title: Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing Remote Code Execution
48
+ Solution: upgrade to ~> 2.3.15, ~> 3.0.19, ~> 3.1.10, >= 3.2.11
48
49
 
49
- Name: rails
50
+ Name: activerecord
50
51
  Version: 3.2.10
51
- CVE: 2013-0156
52
+ Advisory: OSVDB-91453
52
53
  Criticality: High
53
- URL: http://osvdb.org/show/osvdb/89026
54
- Title: Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing
55
- Remote Code Execution
56
- Patched Versions: ~> 2.3.15, ~> 3.0.19, ~> 3.1.10, >= 3.2.11
54
+ URL: http://osvdb.org/show/osvdb/91453
55
+ Title: Symbol DoS vulnerability in Active Record
56
+ Solution: upgrade to ~> 2.3.18, ~> 3.1.12, >= 3.2.13
57
57
 
58
- Name: rails
58
+ Name: activerecord
59
59
  Version: 3.2.10
60
- CVE: 2013-0276
60
+ Advisory: OSVDB-90072
61
61
  Criticality: Medium
62
62
  URL: http://direct.osvdb.org/show/osvdb/90072
63
63
  Title: Ruby on Rails Active Record attr_protected Method Bypass
64
- Patched Versions: ~> 2.3.17, ~> 3.1.11, >= 3.2.12
64
+ Solution: upgrade to ~> 2.3.17, ~> 3.1.11, >= 3.2.12
65
+
66
+ Name: activerecord
67
+ Version: 3.2.10
68
+ Advisory: OSVDB-89025
69
+ Criticality: High
70
+ URL: http://osvdb.org/show/osvdb/89025
71
+ Title: Ruby on Rails Active Record JSON Parameter Parsing Query Bypass
72
+ Solution: upgrade to ~> 2.3.16, ~> 3.0.19, ~> 3.1.10, >= 3.2.11
73
+
74
+ Name: activesupport
75
+ Version: 3.2.10
76
+ Advisory: OSVDB-91451
77
+ Criticality: High
78
+ URL: http://www.osvdb.org/show/osvdb/91451
79
+ Title: XML Parsing Vulnerability affecting JRuby users
80
+ Solution: upgrade to ~> 3.1.12, >= 3.2.13
65
81
 
66
82
  Unpatched versions found!
67
83
 
data/Rakefile CHANGED
@@ -23,13 +23,26 @@ require 'rake'
23
23
  require 'rubygems/tasks'
24
24
  Gem::Tasks.new
25
25
 
26
+ desc 'Updates data/ruby-advisory-db'
27
+ task :update do
28
+ chdir 'data/ruby-advisory-db' do
29
+ sh 'git', 'pull', 'origin', 'master'
30
+ end
31
+
32
+ sh 'git', 'commit', 'data/ruby-advisory-db', '-m', 'Updated ruby-advisory-db'
33
+ end
34
+
26
35
  require 'rspec/core/rake_task'
27
36
  RSpec::Core::RakeTask.new
28
37
 
29
38
  namespace :spec do
30
39
  task :bundle do
31
- %w[spec/bundle/vuln spec/bundle/secure].each do |path|
32
- chdir(path) { sh 'bundle', 'install', '--quiet' }
40
+ root = 'spec/bundle'
41
+
42
+ %w[secure unpatched_gems insecure_sources].each do |bundle|
43
+ chdir(File.join(root,bundle)) do
44
+ sh 'BUNDLE_BIN_PATH="" BUNDLE_GEMFILE="" RUBYOPT="" bundle install --path ../../../vendor/bundle'
45
+ end
33
46
  end
34
47
  end
35
48
  end
@@ -0,0 +1,6 @@
1
+ # Contributing Guidelines
2
+
3
+ ## Style
4
+
5
+ 1. All text must be within 80 columns.
6
+ 2. YAML must be indented by 2 spaces.
@@ -0,0 +1,13 @@
1
+ ### Acknowledgements
2
+
3
+ This database would not be possible without volunteers willing to submit pull requests.
4
+
5
+ Thanks,
6
+ * [Postmodern](https://github.com/postmodern/)
7
+ * [Max Veytsman](https://twitter.com/mveytsman)
8
+ * [Pietro Monteiro](https://github.com/pietro)
9
+ * [Eric Hodel](https://github.com/drbrain)
10
+ * [Brendon Murphy](https://github.com/bemurphy)
11
+ * [Oliver Legg](https://github.com/olly)
12
+ * [Larry W. Cashdollar](http://vapid.dhs.org/)
13
+ * [Michael Grosser](https://github.com/grosser)
@@ -0,0 +1,3 @@
1
+ source 'https://rubygems.org'
2
+ gem 'pry'
3
+ gem 'mechanize'
@@ -0,0 +1,5 @@
1
+ If you submit code or data to the ruby-advisory-db that is copyrighted by yourself, upon submission you hereby agree to release it into the public domain.
2
+
3
+ However, not all of the ruby-advisory-db can be considered public domain. The ruby-advisory-db may contain some information copyrighted by the Open Source Vulnerability Database (http://osvdb.org). If you use ruby-advisory-db data to build a product or a service, it is your responsibility to familiarize yourself with the terms of their license: http://www.osvdb.org/osvdb_license
4
+
5
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
@@ -1,6 +1,13 @@
1
1
  # Ruby Advisory Database
2
2
 
3
- The Ruby advisory database seeks to compile all advisories relevant to Ruby libraries.
3
+ The Ruby Advisory Database aims to compile all advisories that are relevant to Ruby libraries.
4
+
5
+ ## Goals
6
+
7
+ 1. Provide advisory **metadata** in a **simple** yet **structured** [YAML]
8
+ schema for automated tools to consume.
9
+ 2. Avoid reinventing [CVE]s.
10
+ 3. Avoid duplicating the efforts of the [OSVDB].
4
11
 
5
12
  ## Directory Structure
6
13
 
@@ -10,17 +17,22 @@ for the Ruby library. These advisory files are typically named using
10
17
  the advisories [CVE] identifier number.
11
18
 
12
19
  gems/:
13
- rails/:
14
- 2012-1098.yml 2012-2660.yml 2012-2661.yml 2012-3463.yml
20
+ actionpack/:
21
+ CVE-2012-1099.yml CVE-2012-3463.yml CVE-2013-0156.yml
22
+ CVE-2013-1857.yml CVE-2012-3424.yml CVE-2012-3465.yml
23
+ CVE-2013-1855.yml
15
24
 
16
25
  If an advisory does not yet have a [CVE], [requesting a CVE][1] is easy.
26
+
17
27
  ## Format
18
28
 
19
29
  Each advisory file contains the advisory information in [YAML] format:
20
30
 
21
31
  ---
22
- gem: rails
32
+ gem: actionpack
33
+ framework: rails
23
34
  cve: 2013-0156
35
+ osvdb: 89026
24
36
  url: http://osvdb.org/show/osvdb/89026
25
37
  title: |
26
38
  Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing
@@ -43,22 +55,32 @@ Each advisory file contains the advisory information in [YAML] format:
43
55
  ### Schema
44
56
 
45
57
  * `gem` \[String\]: Name of the affected gem.
46
- * `cve` \[String\]: CVE id
58
+ * `framework` \[String\] (optional): Name of framework gem belongs to.
59
+ * `platform` \[String\] (optional): If this vulnerability is platform-specific, name of platform this vulnerability affects (e.g. JRuby)
60
+ * `cve` \[String\]: CVE id.
61
+ * `osvdb` \[Fixnum\]: OSVDB id.
47
62
  * `url` \[String\]: The URL to the full advisory.
48
63
  * `title` \[String\]: The title of the advisory.
64
+ * `date` \[Date\]: Disclosure date of the advisory.
49
65
  * `description` \[String\]: Multi-paragraph description of the vulnerability.
50
66
  * `cvss_v2` \[Float\]: The [CVSSv2] score for the vulnerability.
67
+ * `unaffected_versions` \[Array\<String\>\] (optional): The version requirements for the
68
+ unaffected versions of the Ruby library.
51
69
  * `patched_versions` \[Array\<String\>\]: The version requirements for the
52
70
  patched versions of the Ruby library.
53
71
 
54
72
  ## Credits
55
73
 
56
- * [Postmodern](https://github.com/postmodern/)
57
- * [Max Veytsman](https://twitter.com/mveytsman)
74
+ Please see [CONTRIBUTORS.md].
75
+
76
+ This database also includes data from the [Open Source Vulnerability Database][OSVDB]
77
+ developed by the Open Security Foundation (OSF) and its contributors.
58
78
 
59
79
  [rubygems.org]: https://rubygems.org/
60
80
  [CVE]: http://cve.mitre.org/
61
81
  [CVSSv2]: http://www.first.org/cvss/cvss-guide.html
82
+ [OSVDB]: http://www.osvdb.org/
62
83
  [YAML]: http://www.yaml.org/
84
+ [CONTRIBUTORS.md]: https://github.com/rubysec/ruby-advisory-db/blob/master/CONTRIBUTORS.md
63
85
 
64
86
  [1]: http://people.redhat.com/kseifrie/CVE-OpenSource-Request-HOWTO.html
@@ -0,0 +1,27 @@
1
+ require 'yaml'
2
+
3
+ namespace :lint do
4
+ begin
5
+ gem 'rspec', '~> 2.4'
6
+ require 'rspec/core/rake_task'
7
+
8
+ RSpec::Core::RakeTask.new(:yaml)
9
+ rescue LoadError => e
10
+ task :spec do
11
+ abort "Please run `gem install rspec` to install RSpec."
12
+ end
13
+ end
14
+
15
+ task :cve do
16
+ Dir.glob('gems/*/*.yml') do |path|
17
+ advisory = YAML.load_file(path)
18
+
19
+ unless advisory['cve']
20
+ puts "Missing CVE: #{path}"
21
+ end
22
+ end
23
+ end
24
+ end
25
+
26
+ task :lint => ['lint:yaml', 'lint:cve']
27
+ task :default => :lint
@@ -1,10 +1,13 @@
1
1
  ---
2
2
  gem: actionpack
3
+ framework: rails
3
4
  cve: 2012-1099
5
+ osvdb: 79727
4
6
  url: http://www.osvdb.org/show/osvdb/79727
5
7
  title:
6
8
  Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb
7
9
  Manually Generated Select Tag Options XSS
10
+ date: 2012-03-01
8
11
 
9
12
  description: |
10
13
  Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
@@ -1,10 +1,13 @@
1
1
  ---
2
2
  gem: actionpack
3
+ framework: rails
3
4
  cve: 2012-3424
5
+ osvdb: 84243
4
6
  url: http://www.osvdb.org/show/osvdb/84243
5
7
  title:
6
8
  Ruby on Rails actionpack/lib/action_controller/metal/http_authentication.rb
7
9
  with_http_digest Helper Method Remote DoS
10
+ date: 2012-07-26
8
11
 
9
12
  description: |
10
13
  Ruby on Rails contains a flaw that may allow a remote denial of service.
@@ -15,7 +18,11 @@ description: |
15
18
 
16
19
  cvss_v2: 4.3
17
20
 
21
+ unaffected_versions:
22
+ - ">= 2.3.5, <= 2.3.14"
23
+
18
24
  patched_versions:
19
25
  - ~> 3.0.16
20
26
  - ~> 3.1.7
21
27
  - ">= 3.2.7"
28
+
@@ -1,8 +1,11 @@
1
1
  ---
2
2
  gem: actionpack
3
+ framework: rails
3
4
  cve: 2012-3465
5
+ osvdb: 84513
4
6
  url: http://www.osvdb.org/show/osvdb/84513
5
7
  title: Ruby on Rails strip_tags Helper Method XSS
8
+ date: 2012-08-09
6
9
 
7
10
  description: |
8
11
  Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
@@ -1,8 +1,11 @@
1
1
  ---
2
2
  gem: actionpack
3
+ framework: rails
3
4
  cve: 2012-3463
5
+ osvdb: 84515
4
6
  url: http://osvdb.org/84515
5
7
  title: Ruby on Rails select_tag Helper Method prompt Value XSS
8
+ date: 2012-08-09
6
9
 
7
10
  description: |
8
11
  Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
@@ -14,6 +17,9 @@ description: |
14
17
 
15
18
  cvss_v2: 4.3
16
19
 
20
+ unaffected_versions:
21
+ - ~> 2.3.0
22
+
17
23
  patched_versions:
18
24
  - ~> 3.0.17
19
25
  - ~> 3.1.8
@@ -1,10 +1,13 @@
1
1
  ---
2
2
  gem: actionpack
3
+ framework: rails
3
4
  cve: 2013-0156
5
+ osvdb: 89026
4
6
  url: http://osvdb.org/show/osvdb/89026
5
7
  title:
6
8
  Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing
7
9
  Remote Code Execution
10
+ date: 2013-01-08
8
11
 
9
12
  description: |
10
13
  Ruby on Rails contains a flaw in params_parser.rb of the Action Pack.
@@ -0,0 +1,20 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-1855
5
+ osvdb: 91452
6
+ url: http://www.osvdb.org/show/osvdb/91452
7
+ title: XSS vulnerability in sanitize_css in Action Pack
8
+ date: 2013-03-19
9
+
10
+ description: |
11
+ There is an XSS vulnerability in the `sanitize_css` method in Action
12
+ Pack. Carefully crafted text can bypass the sanitization provided in
13
+ the `sanitize_css` method in Action Pack
14
+
15
+ cvss_v2: 4.0
16
+
17
+ patched_versions:
18
+ - ~> 2.3.18
19
+ - ~> 3.1.12
20
+ - ">= 3.2.13"
@@ -0,0 +1,23 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-1857
5
+ osvdb: 91454
6
+ url: http://osvdb.org/show/osvdb/91454
7
+ title: XSS Vulnerability in the `sanitize` helper of Ruby on Rails
8
+ date: 2013-03-19
9
+
10
+ description: |
11
+ The sanitize helper in Ruby on Rails is designed to
12
+ filter HTML and remove all tags and attributes which could be
13
+ malicious. The code which ensured that URLs only contain supported
14
+ protocols contained several bugs which could allow an attacker to
15
+ embed a tag containing a URL which executes arbitrary javascript
16
+ code.
17
+
18
+ cvss_v2: 4.0
19
+
20
+ patched_versions:
21
+ - ~> 2.3.18
22
+ - ~> 3.1.12
23
+ - ">= 3.2.13"