bundler-audit 0.1.2 → 0.2.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.gitignore +1 -1
- data/ChangeLog.md +10 -0
- data/Gemfile +1 -1
- data/README.md +50 -34
- data/Rakefile +15 -2
- data/data/ruby-advisory-db/CONTRIBUTING.md +6 -0
- data/data/ruby-advisory-db/CONTRIBUTORS.md +13 -0
- data/data/ruby-advisory-db/Gemfile +3 -0
- data/data/ruby-advisory-db/LICENSE.txt +5 -0
- data/data/ruby-advisory-db/README.md +29 -7
- data/data/ruby-advisory-db/Rakefile +27 -0
- data/data/ruby-advisory-db/gems/actionpack/{2012-1099.yml → OSVDB-79727.yml} +3 -0
- data/data/ruby-advisory-db/gems/actionpack/{2012-3424.yml → OSVDB-84243.yml} +7 -0
- data/data/ruby-advisory-db/gems/actionpack/{2012-3465.yml → OSVDB-84513.yml} +3 -0
- data/data/ruby-advisory-db/gems/actionpack/{2012-3463.yml → OSVDB-84515.yml} +6 -0
- data/data/ruby-advisory-db/gems/actionpack/{2013-0156.yml → OSVDB-89026.yml} +3 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +20 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +23 -0
- data/data/ruby-advisory-db/gems/activerecord/{2012-2661.yml → OSVDB-82403.yml} +6 -0
- data/data/ruby-advisory-db/gems/activerecord/{2012-2660.yml → OSVDB-82610.yml} +3 -0
- data/data/ruby-advisory-db/gems/activerecord/{2013-0155.yml → OSVDB-89025.yml} +3 -0
- data/data/ruby-advisory-db/gems/activerecord/{2013-0276.yml → OSVDB-90072.yml} +3 -0
- data/data/ruby-advisory-db/gems/activerecord/{2013-0277.yml → OSVDB-90073.yml} +3 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-91453.yml +26 -0
- data/data/ruby-advisory-db/gems/activesupport/{2012-1098.yml → OSVDB-79726.yml} +6 -0
- data/data/ruby-advisory-db/gems/activesupport/{2012-3464.yml → OSVDB-84516.yml} +3 -0
- data/data/ruby-advisory-db/gems/activesupport/{2013-0333.yml → OSVDB-89594.yml} +3 -0
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-91451.yml +28 -0
- data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +10 -0
- data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +17 -0
- data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +11 -0
- data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +12 -0
- data/data/ruby-advisory-db/gems/devise/{2013-0233.yml → OSVDB-89642.yml} +2 -0
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +19 -0
- data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +9 -0
- data/data/ruby-advisory-db/gems/extlib/OSVDB-90740.yml +18 -0
- data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +12 -0
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +10 -0
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +10 -0
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +10 -0
- data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +9 -0
- data/data/ruby-advisory-db/gems/ftpd/OSVDB-90784.yml +18 -0
- data/data/ruby-advisory-db/gems/gtk2/{2007-6183.yml → OSVDB-40774.yml} +2 -0
- data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +19 -0
- data/data/ruby-advisory-db/gems/json/{2013-0269.yml → OSVDB-90074.yml} +4 -2
- data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +10 -0
- data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +10 -0
- data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +10 -0
- data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +21 -0
- data/data/ruby-advisory-db/gems/mail/{2011-0739.yml → OSVDB-70667.yml} +2 -0
- data/data/ruby-advisory-db/gems/mail/{2012-2139.yml → OSVDB-81631.yml} +3 -0
- data/data/ruby-advisory-db/gems/mail/{2012-2140.yml → OSVDB-81632.yml} +7 -2
- data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +10 -0
- data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +15 -0
- data/data/ruby-advisory-db/gems/multi_xml/{2013-0175.yml → OSVDB-89148.yml} +2 -0
- data/data/ruby-advisory-db/gems/newrelic_rpm/{2013-0284.yml → OSVDB-90189.yml} +4 -2
- data/data/ruby-advisory-db/gems/nori/{2013-0285.yml → OSVDB-90196.yml} +4 -2
- data/data/ruby-advisory-db/gems/omniauth-oauth2/{2012-6134.yml → OSVDB-90264.yml} +4 -2
- data/data/ruby-advisory-db/gems/pdfkit/OSVDB-90867.yml +11 -0
- data/data/ruby-advisory-db/gems/rack-cache/{2012-267.yml → OSVDB-83077.yml} +3 -1
- data/data/ruby-advisory-db/gems/rack/{2013-0263.yml → OSVDB-89939.yml} +2 -0
- data/data/ruby-advisory-db/gems/rdoc/{2013-0256.yml → OSVDB-90004.yml} +2 -0
- data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +13 -0
- data/data/ruby-advisory-db/gems/ruby_parser/OSVDB-90561.yml +11 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +10 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +10 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +10 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +10 -0
- data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +10 -0
- data/data/ruby-advisory-db/lib/scrape.rb +87 -0
- data/data/ruby-advisory-db/spec/advisory_example.rb +97 -12
- data/gemspec.yml +3 -1
- data/lib/bundler/audit/advisory.rb +46 -16
- data/lib/bundler/audit/cli.rb +23 -19
- data/lib/bundler/audit/scanner.rb +97 -0
- data/lib/bundler/audit/version.rb +1 -1
- data/spec/advisory_spec.rb +66 -6
- data/spec/bundle/insecure_sources/Gemfile +39 -0
- data/spec/bundle/secure/Gemfile +1 -1
- data/spec/bundle/{vuln → unpatched_gems}/Gemfile +0 -0
- data/spec/integration_spec.rb +75 -6
- data/spec/scanner_spec.rb +74 -0
- metadata +77 -40
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: 0a34b6a79c055b51422c7c3225428947ca6b587e
|
4
|
+
data.tar.gz: 724414726507e87d679a561759e9dcbdd90aecfc
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: b3c59aadb9c0f2ed1b8d3a91bf6866e54295ed78105531ff1362c5ef65f264ac02699c53d3e8e3d08f025ebc9e38ef5917de4fa9906b66e2e209131a14665e42
|
7
|
+
data.tar.gz: f82127fe64b6bb856483ee82f5ab642fee371d4c84695e05beef44414857e4c95dd7f5a1e27244af9b2c81e9364a16027bb333ab123a547ab1a9bf6654a5f3df
|
data/.gitignore
CHANGED
data/ChangeLog.md
CHANGED
@@ -1,3 +1,13 @@
|
|
1
|
+
### 0.2.0 / 2013-03-05
|
2
|
+
|
3
|
+
* Require RubyGems >= 1.8.0. Prior versions of RubyGems could not correctly
|
4
|
+
parse approximate version requirements (`~> 1.2.3`).
|
5
|
+
* Updated the [ruby-advisory-db].
|
6
|
+
* Added {Bundle::Audit::Advisory#unaffected_versions}.
|
7
|
+
* Added {Bundle::Audit::Advisory#unaffected?}.
|
8
|
+
* Added {Bundle::Audit::Advisory#patched?}.
|
9
|
+
* Renamed `Advisory#cve` to {Bundle::Audit::Advisory#id}.
|
10
|
+
|
1
11
|
### 0.1.2 / 2013-02-17
|
2
12
|
|
3
13
|
* Require [bundler] ~> 1.2.
|
data/Gemfile
CHANGED
data/README.md
CHANGED
@@ -1,11 +1,11 @@
|
|
1
1
|
# bundler-audit
|
2
2
|
|
3
|
-
* [Homepage](https://github.com/
|
4
|
-
* [Issues](https://github.com/
|
3
|
+
* [Homepage](https://github.com/rubysec/bundler-audit#readme)
|
4
|
+
* [Issues](https://github.com/rubysec/bundler-audit/issues)
|
5
5
|
* [Documentation](http://rubydoc.info/gems/bundler-audit/frames)
|
6
|
-
* [Email](mailto:
|
7
|
-
* [![Build Status](https://travis-ci.org/
|
8
|
-
|
6
|
+
* [Email](mailto:rubysec.mod3 at gmail.com)
|
7
|
+
* [![Build Status](https://travis-ci.org/rubysec/bundler-audit.png)](https://travis-ci.org/rubysec/bundler-audit)
|
8
|
+
* [![Code Climate](https://codeclimate.com/github/rubysec/bundler-audit.png)](https://codeclimate.com/github/rubysec/bundler-audit)
|
9
9
|
|
10
10
|
## Description
|
11
11
|
|
@@ -14,6 +14,8 @@ Patch-level verification for [Bundler][bundler].
|
|
14
14
|
## Features
|
15
15
|
|
16
16
|
* Checks for vulnerable versions of gems in `Gemfile.lock`.
|
17
|
+
* Checks for insecure gem sources (`http://`).
|
18
|
+
* Allows ignoring certain advisories that have been manually worked around.
|
17
19
|
* Prints advisory information.
|
18
20
|
* Does not require a network connection.
|
19
21
|
|
@@ -21,47 +23,61 @@ Patch-level verification for [Bundler][bundler].
|
|
21
23
|
|
22
24
|
Audit a projects `Gemfile.lock`:
|
23
25
|
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
Patched Versions: ~> 1.1.6, ~> 1.2.8, ~> 1.3.10, ~> 1.4.5, >= 1.5.2
|
26
|
+
Name: actionpack
|
27
|
+
Version: 3.2.10
|
28
|
+
Advisory: OSVDB-91452
|
29
|
+
Criticality: Medium
|
30
|
+
URL: http://www.osvdb.org/show/osvdb/91452
|
31
|
+
Title: XSS vulnerability in sanitize_css in Action Pack
|
32
|
+
Solution: upgrade to ~> 2.3.18, ~> 3.1.12, >= 3.2.13
|
32
33
|
|
33
|
-
Name:
|
34
|
-
Version:
|
35
|
-
|
36
|
-
Criticality:
|
37
|
-
URL: http://
|
38
|
-
Title:
|
39
|
-
|
34
|
+
Name: actionpack
|
35
|
+
Version: 3.2.10
|
36
|
+
Advisory: OSVDB-91454
|
37
|
+
Criticality: Medium
|
38
|
+
URL: http://osvdb.org/show/osvdb/91454
|
39
|
+
Title: XSS Vulnerability in the `sanitize` helper of Ruby on Rails
|
40
|
+
Solution: upgrade to ~> 2.3.18, ~> 3.1.12, >= 3.2.13
|
40
41
|
|
41
|
-
Name:
|
42
|
+
Name: actionpack
|
42
43
|
Version: 3.2.10
|
43
|
-
|
44
|
+
Advisory: OSVDB-89026
|
44
45
|
Criticality: High
|
45
|
-
URL: http://osvdb.org/show/osvdb/
|
46
|
-
Title: Ruby on Rails
|
47
|
-
|
46
|
+
URL: http://osvdb.org/show/osvdb/89026
|
47
|
+
Title: Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing Remote Code Execution
|
48
|
+
Solution: upgrade to ~> 2.3.15, ~> 3.0.19, ~> 3.1.10, >= 3.2.11
|
48
49
|
|
49
|
-
Name:
|
50
|
+
Name: activerecord
|
50
51
|
Version: 3.2.10
|
51
|
-
|
52
|
+
Advisory: OSVDB-91453
|
52
53
|
Criticality: High
|
53
|
-
URL: http://osvdb.org/show/osvdb/
|
54
|
-
Title:
|
55
|
-
|
56
|
-
Patched Versions: ~> 2.3.15, ~> 3.0.19, ~> 3.1.10, >= 3.2.11
|
54
|
+
URL: http://osvdb.org/show/osvdb/91453
|
55
|
+
Title: Symbol DoS vulnerability in Active Record
|
56
|
+
Solution: upgrade to ~> 2.3.18, ~> 3.1.12, >= 3.2.13
|
57
57
|
|
58
|
-
Name:
|
58
|
+
Name: activerecord
|
59
59
|
Version: 3.2.10
|
60
|
-
|
60
|
+
Advisory: OSVDB-90072
|
61
61
|
Criticality: Medium
|
62
62
|
URL: http://direct.osvdb.org/show/osvdb/90072
|
63
63
|
Title: Ruby on Rails Active Record attr_protected Method Bypass
|
64
|
-
|
64
|
+
Solution: upgrade to ~> 2.3.17, ~> 3.1.11, >= 3.2.12
|
65
|
+
|
66
|
+
Name: activerecord
|
67
|
+
Version: 3.2.10
|
68
|
+
Advisory: OSVDB-89025
|
69
|
+
Criticality: High
|
70
|
+
URL: http://osvdb.org/show/osvdb/89025
|
71
|
+
Title: Ruby on Rails Active Record JSON Parameter Parsing Query Bypass
|
72
|
+
Solution: upgrade to ~> 2.3.16, ~> 3.0.19, ~> 3.1.10, >= 3.2.11
|
73
|
+
|
74
|
+
Name: activesupport
|
75
|
+
Version: 3.2.10
|
76
|
+
Advisory: OSVDB-91451
|
77
|
+
Criticality: High
|
78
|
+
URL: http://www.osvdb.org/show/osvdb/91451
|
79
|
+
Title: XML Parsing Vulnerability affecting JRuby users
|
80
|
+
Solution: upgrade to ~> 3.1.12, >= 3.2.13
|
65
81
|
|
66
82
|
Unpatched versions found!
|
67
83
|
|
data/Rakefile
CHANGED
@@ -23,13 +23,26 @@ require 'rake'
|
|
23
23
|
require 'rubygems/tasks'
|
24
24
|
Gem::Tasks.new
|
25
25
|
|
26
|
+
desc 'Updates data/ruby-advisory-db'
|
27
|
+
task :update do
|
28
|
+
chdir 'data/ruby-advisory-db' do
|
29
|
+
sh 'git', 'pull', 'origin', 'master'
|
30
|
+
end
|
31
|
+
|
32
|
+
sh 'git', 'commit', 'data/ruby-advisory-db', '-m', 'Updated ruby-advisory-db'
|
33
|
+
end
|
34
|
+
|
26
35
|
require 'rspec/core/rake_task'
|
27
36
|
RSpec::Core::RakeTask.new
|
28
37
|
|
29
38
|
namespace :spec do
|
30
39
|
task :bundle do
|
31
|
-
|
32
|
-
|
40
|
+
root = 'spec/bundle'
|
41
|
+
|
42
|
+
%w[secure unpatched_gems insecure_sources].each do |bundle|
|
43
|
+
chdir(File.join(root,bundle)) do
|
44
|
+
sh 'BUNDLE_BIN_PATH="" BUNDLE_GEMFILE="" RUBYOPT="" bundle install --path ../../../vendor/bundle'
|
45
|
+
end
|
33
46
|
end
|
34
47
|
end
|
35
48
|
end
|
@@ -0,0 +1,13 @@
|
|
1
|
+
### Acknowledgements
|
2
|
+
|
3
|
+
This database would not be possible without volunteers willing to submit pull requests.
|
4
|
+
|
5
|
+
Thanks,
|
6
|
+
* [Postmodern](https://github.com/postmodern/)
|
7
|
+
* [Max Veytsman](https://twitter.com/mveytsman)
|
8
|
+
* [Pietro Monteiro](https://github.com/pietro)
|
9
|
+
* [Eric Hodel](https://github.com/drbrain)
|
10
|
+
* [Brendon Murphy](https://github.com/bemurphy)
|
11
|
+
* [Oliver Legg](https://github.com/olly)
|
12
|
+
* [Larry W. Cashdollar](http://vapid.dhs.org/)
|
13
|
+
* [Michael Grosser](https://github.com/grosser)
|
@@ -0,0 +1,5 @@
|
|
1
|
+
If you submit code or data to the ruby-advisory-db that is copyrighted by yourself, upon submission you hereby agree to release it into the public domain.
|
2
|
+
|
3
|
+
However, not all of the ruby-advisory-db can be considered public domain. The ruby-advisory-db may contain some information copyrighted by the Open Source Vulnerability Database (http://osvdb.org). If you use ruby-advisory-db data to build a product or a service, it is your responsibility to familiarize yourself with the terms of their license: http://www.osvdb.org/osvdb_license
|
4
|
+
|
5
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
@@ -1,6 +1,13 @@
|
|
1
1
|
# Ruby Advisory Database
|
2
2
|
|
3
|
-
The Ruby
|
3
|
+
The Ruby Advisory Database aims to compile all advisories that are relevant to Ruby libraries.
|
4
|
+
|
5
|
+
## Goals
|
6
|
+
|
7
|
+
1. Provide advisory **metadata** in a **simple** yet **structured** [YAML]
|
8
|
+
schema for automated tools to consume.
|
9
|
+
2. Avoid reinventing [CVE]s.
|
10
|
+
3. Avoid duplicating the efforts of the [OSVDB].
|
4
11
|
|
5
12
|
## Directory Structure
|
6
13
|
|
@@ -10,17 +17,22 @@ for the Ruby library. These advisory files are typically named using
|
|
10
17
|
the advisories [CVE] identifier number.
|
11
18
|
|
12
19
|
gems/:
|
13
|
-
|
14
|
-
2012-
|
20
|
+
actionpack/:
|
21
|
+
CVE-2012-1099.yml CVE-2012-3463.yml CVE-2013-0156.yml
|
22
|
+
CVE-2013-1857.yml CVE-2012-3424.yml CVE-2012-3465.yml
|
23
|
+
CVE-2013-1855.yml
|
15
24
|
|
16
25
|
If an advisory does not yet have a [CVE], [requesting a CVE][1] is easy.
|
26
|
+
|
17
27
|
## Format
|
18
28
|
|
19
29
|
Each advisory file contains the advisory information in [YAML] format:
|
20
30
|
|
21
31
|
---
|
22
|
-
gem:
|
32
|
+
gem: actionpack
|
33
|
+
framework: rails
|
23
34
|
cve: 2013-0156
|
35
|
+
osvdb: 89026
|
24
36
|
url: http://osvdb.org/show/osvdb/89026
|
25
37
|
title: |
|
26
38
|
Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing
|
@@ -43,22 +55,32 @@ Each advisory file contains the advisory information in [YAML] format:
|
|
43
55
|
### Schema
|
44
56
|
|
45
57
|
* `gem` \[String\]: Name of the affected gem.
|
46
|
-
* `
|
58
|
+
* `framework` \[String\] (optional): Name of framework gem belongs to.
|
59
|
+
* `platform` \[String\] (optional): If this vulnerability is platform-specific, name of platform this vulnerability affects (e.g. JRuby)
|
60
|
+
* `cve` \[String\]: CVE id.
|
61
|
+
* `osvdb` \[Fixnum\]: OSVDB id.
|
47
62
|
* `url` \[String\]: The URL to the full advisory.
|
48
63
|
* `title` \[String\]: The title of the advisory.
|
64
|
+
* `date` \[Date\]: Disclosure date of the advisory.
|
49
65
|
* `description` \[String\]: Multi-paragraph description of the vulnerability.
|
50
66
|
* `cvss_v2` \[Float\]: The [CVSSv2] score for the vulnerability.
|
67
|
+
* `unaffected_versions` \[Array\<String\>\] (optional): The version requirements for the
|
68
|
+
unaffected versions of the Ruby library.
|
51
69
|
* `patched_versions` \[Array\<String\>\]: The version requirements for the
|
52
70
|
patched versions of the Ruby library.
|
53
71
|
|
54
72
|
## Credits
|
55
73
|
|
56
|
-
|
57
|
-
|
74
|
+
Please see [CONTRIBUTORS.md].
|
75
|
+
|
76
|
+
This database also includes data from the [Open Source Vulnerability Database][OSVDB]
|
77
|
+
developed by the Open Security Foundation (OSF) and its contributors.
|
58
78
|
|
59
79
|
[rubygems.org]: https://rubygems.org/
|
60
80
|
[CVE]: http://cve.mitre.org/
|
61
81
|
[CVSSv2]: http://www.first.org/cvss/cvss-guide.html
|
82
|
+
[OSVDB]: http://www.osvdb.org/
|
62
83
|
[YAML]: http://www.yaml.org/
|
84
|
+
[CONTRIBUTORS.md]: https://github.com/rubysec/ruby-advisory-db/blob/master/CONTRIBUTORS.md
|
63
85
|
|
64
86
|
[1]: http://people.redhat.com/kseifrie/CVE-OpenSource-Request-HOWTO.html
|
@@ -0,0 +1,27 @@
|
|
1
|
+
require 'yaml'
|
2
|
+
|
3
|
+
namespace :lint do
|
4
|
+
begin
|
5
|
+
gem 'rspec', '~> 2.4'
|
6
|
+
require 'rspec/core/rake_task'
|
7
|
+
|
8
|
+
RSpec::Core::RakeTask.new(:yaml)
|
9
|
+
rescue LoadError => e
|
10
|
+
task :spec do
|
11
|
+
abort "Please run `gem install rspec` to install RSpec."
|
12
|
+
end
|
13
|
+
end
|
14
|
+
|
15
|
+
task :cve do
|
16
|
+
Dir.glob('gems/*/*.yml') do |path|
|
17
|
+
advisory = YAML.load_file(path)
|
18
|
+
|
19
|
+
unless advisory['cve']
|
20
|
+
puts "Missing CVE: #{path}"
|
21
|
+
end
|
22
|
+
end
|
23
|
+
end
|
24
|
+
end
|
25
|
+
|
26
|
+
task :lint => ['lint:yaml', 'lint:cve']
|
27
|
+
task :default => :lint
|
@@ -1,10 +1,13 @@
|
|
1
1
|
---
|
2
2
|
gem: actionpack
|
3
|
+
framework: rails
|
3
4
|
cve: 2012-1099
|
5
|
+
osvdb: 79727
|
4
6
|
url: http://www.osvdb.org/show/osvdb/79727
|
5
7
|
title:
|
6
8
|
Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb
|
7
9
|
Manually Generated Select Tag Options XSS
|
10
|
+
date: 2012-03-01
|
8
11
|
|
9
12
|
description: |
|
10
13
|
Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
|
@@ -1,10 +1,13 @@
|
|
1
1
|
---
|
2
2
|
gem: actionpack
|
3
|
+
framework: rails
|
3
4
|
cve: 2012-3424
|
5
|
+
osvdb: 84243
|
4
6
|
url: http://www.osvdb.org/show/osvdb/84243
|
5
7
|
title:
|
6
8
|
Ruby on Rails actionpack/lib/action_controller/metal/http_authentication.rb
|
7
9
|
with_http_digest Helper Method Remote DoS
|
10
|
+
date: 2012-07-26
|
8
11
|
|
9
12
|
description: |
|
10
13
|
Ruby on Rails contains a flaw that may allow a remote denial of service.
|
@@ -15,7 +18,11 @@ description: |
|
|
15
18
|
|
16
19
|
cvss_v2: 4.3
|
17
20
|
|
21
|
+
unaffected_versions:
|
22
|
+
- ">= 2.3.5, <= 2.3.14"
|
23
|
+
|
18
24
|
patched_versions:
|
19
25
|
- ~> 3.0.16
|
20
26
|
- ~> 3.1.7
|
21
27
|
- ">= 3.2.7"
|
28
|
+
|
@@ -1,8 +1,11 @@
|
|
1
1
|
---
|
2
2
|
gem: actionpack
|
3
|
+
framework: rails
|
3
4
|
cve: 2012-3465
|
5
|
+
osvdb: 84513
|
4
6
|
url: http://www.osvdb.org/show/osvdb/84513
|
5
7
|
title: Ruby on Rails strip_tags Helper Method XSS
|
8
|
+
date: 2012-08-09
|
6
9
|
|
7
10
|
description: |
|
8
11
|
Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
|
@@ -1,8 +1,11 @@
|
|
1
1
|
---
|
2
2
|
gem: actionpack
|
3
|
+
framework: rails
|
3
4
|
cve: 2012-3463
|
5
|
+
osvdb: 84515
|
4
6
|
url: http://osvdb.org/84515
|
5
7
|
title: Ruby on Rails select_tag Helper Method prompt Value XSS
|
8
|
+
date: 2012-08-09
|
6
9
|
|
7
10
|
description: |
|
8
11
|
Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
|
@@ -14,6 +17,9 @@ description: |
|
|
14
17
|
|
15
18
|
cvss_v2: 4.3
|
16
19
|
|
20
|
+
unaffected_versions:
|
21
|
+
- ~> 2.3.0
|
22
|
+
|
17
23
|
patched_versions:
|
18
24
|
- ~> 3.0.17
|
19
25
|
- ~> 3.1.8
|
@@ -1,10 +1,13 @@
|
|
1
1
|
---
|
2
2
|
gem: actionpack
|
3
|
+
framework: rails
|
3
4
|
cve: 2013-0156
|
5
|
+
osvdb: 89026
|
4
6
|
url: http://osvdb.org/show/osvdb/89026
|
5
7
|
title:
|
6
8
|
Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing
|
7
9
|
Remote Code Execution
|
10
|
+
date: 2013-01-08
|
8
11
|
|
9
12
|
description: |
|
10
13
|
Ruby on Rails contains a flaw in params_parser.rb of the Action Pack.
|
@@ -0,0 +1,20 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-1855
|
5
|
+
osvdb: 91452
|
6
|
+
url: http://www.osvdb.org/show/osvdb/91452
|
7
|
+
title: XSS vulnerability in sanitize_css in Action Pack
|
8
|
+
date: 2013-03-19
|
9
|
+
|
10
|
+
description: |
|
11
|
+
There is an XSS vulnerability in the `sanitize_css` method in Action
|
12
|
+
Pack. Carefully crafted text can bypass the sanitization provided in
|
13
|
+
the `sanitize_css` method in Action Pack
|
14
|
+
|
15
|
+
cvss_v2: 4.0
|
16
|
+
|
17
|
+
patched_versions:
|
18
|
+
- ~> 2.3.18
|
19
|
+
- ~> 3.1.12
|
20
|
+
- ">= 3.2.13"
|
@@ -0,0 +1,23 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-1857
|
5
|
+
osvdb: 91454
|
6
|
+
url: http://osvdb.org/show/osvdb/91454
|
7
|
+
title: XSS Vulnerability in the `sanitize` helper of Ruby on Rails
|
8
|
+
date: 2013-03-19
|
9
|
+
|
10
|
+
description: |
|
11
|
+
The sanitize helper in Ruby on Rails is designed to
|
12
|
+
filter HTML and remove all tags and attributes which could be
|
13
|
+
malicious. The code which ensured that URLs only contain supported
|
14
|
+
protocols contained several bugs which could allow an attacker to
|
15
|
+
embed a tag containing a URL which executes arbitrary javascript
|
16
|
+
code.
|
17
|
+
|
18
|
+
cvss_v2: 4.0
|
19
|
+
|
20
|
+
patched_versions:
|
21
|
+
- ~> 2.3.18
|
22
|
+
- ~> 3.1.12
|
23
|
+
- ">= 3.2.13"
|