bundler-audit 0.3.0 → 0.3.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (59) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +3 -0
  3. data/.travis.yml +1 -0
  4. data/ChangeLog.md +10 -0
  5. data/README.md +5 -1
  6. data/Rakefile +8 -0
  7. data/data/ruby-advisory-db.ts +1 -0
  8. data/data/ruby-advisory-db/CONTRIBUTORS.md +9 -0
  9. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +20 -0
  10. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +21 -0
  11. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +27 -0
  12. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +24 -0
  13. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +22 -0
  14. data/data/ruby-advisory-db/gems/actionpack/OSVDB-103439.yml +24 -0
  15. data/data/ruby-advisory-db/gems/actionpack/OSVDB-103440.yml +22 -0
  16. data/data/ruby-advisory-db/gems/activerecord/OSVDB-103438.yml +23 -0
  17. data/data/ruby-advisory-db/gems/arabic-prawn/OSVDB-104365.yml +15 -0
  18. data/data/ruby-advisory-db/gems/cocaine/OSVDB-98835.yml +2 -2
  19. data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +1 -1
  20. data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +1 -1
  21. data/data/ruby-advisory-db/gems/echor/OSVDB-102129.yml +11 -0
  22. data/data/ruby-advisory-db/gems/echor/OSVDB-102130.yml +10 -0
  23. data/data/ruby-advisory-db/gems/gitlab-grit/OSVDB-99370.yml +14 -0
  24. data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +3 -8
  25. data/data/ruby-advisory-db/gems/i18n/OSVDB-100528.yml +17 -0
  26. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101179.yml +12 -0
  27. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101458.yml +15 -0
  28. data/data/ruby-advisory-db/gems/nori/OSVDB-90196.yml +1 -1
  29. data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99693.yml +22 -0
  30. data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99888.yml +17 -0
  31. data/data/ruby-advisory-db/gems/paperclip/OSVDB-103151.yml +13 -0
  32. data/data/ruby-advisory-db/gems/paratrooper-newrelic/OSVDB-101839.yml +12 -0
  33. data/data/ruby-advisory-db/gems/paratrooper-pingdom/OSVDB-101847.yml +13 -0
  34. data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +1 -1
  35. data/data/ruby-advisory-db/gems/rbovirt/OSVDB-104080.yml +20 -0
  36. data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +2 -1
  37. data/data/ruby-advisory-db/gems/sfpagent/OSVDB-105971.yml +13 -0
  38. data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +3 -2
  39. data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +3 -2
  40. data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +3 -2
  41. data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +3 -2
  42. data/data/ruby-advisory-db/gems/sprout/OSVDB-100598.yml +14 -0
  43. data/data/ruby-advisory-db/gems/webbynode/OSVDB-100920.yml +11 -0
  44. data/data/ruby-advisory-db/gems/will_paginate/OSVDB-101138.yml +15 -0
  45. data/data/ruby-advisory-db/spec/advisory_example.rb +3 -3
  46. data/data/ruby-advisory-db/spec/gems_spec.rb +3 -4
  47. data/gemspec.yml +1 -0
  48. data/lib/bundler/audit.rb +1 -1
  49. data/lib/bundler/audit/advisory.rb +1 -1
  50. data/lib/bundler/audit/cli.rb +5 -4
  51. data/lib/bundler/audit/database.rb +6 -3
  52. data/lib/bundler/audit/version.rb +2 -2
  53. data/spec/advisory_spec.rb +27 -2
  54. data/spec/bundle/secure/Gemfile +1 -1
  55. data/spec/database_spec.rb +58 -1
  56. data/spec/fixtures/not_a_hash.yml +2 -0
  57. data/spec/integration_spec.rb +10 -69
  58. data/spec/spec_helper.rb +40 -0
  59. metadata +44 -3
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 679e11f046f11e432067d55398791fdbf03536b3
4
- data.tar.gz: ad6bb67d40dae3ee0346ffe18caa11ee19e142e6
3
+ metadata.gz: eb1773e0d185dcc826b346744c13db1af6aaebab
4
+ data.tar.gz: 617a25945731a1f38563599b1fb715ff0f95a4d2
5
5
  SHA512:
6
- metadata.gz: 48e2f1e83c0122d4629e4ddd02d448f90578527b40a1a0fccf331903413fbb2f3df7952399723914c0e0450f6682187af4301404b98bacc61ad794b5633a3023
7
- data.tar.gz: 2c868a8106f74e45ffe9bcf02d1578d7326c4bea0a12baddf79ab7bd9dc059b599b39e0a41d167a0bc6d0bbbf01a8dc7e5f28a53849fea88a7214da400f5b52a
6
+ metadata.gz: 30ad678294da6ef14df9fac8b0d3bbcabaac517eb25c23a26efaeff8a9f01b34f458e3d10ef518ce720b9840362fce0506420064e56b15b1cfca724cae35dcc0
7
+ data.tar.gz: 7d4810f14c9bb158dba5a57fe5151dd9ff812c948c9919defbb291ee76a140def1e62ecaacd8daab3feb88e95a49fd0c1769c12269d301a6bd224f28b0f64bff
data/.gitignore CHANGED
@@ -1,5 +1,8 @@
1
1
  Gemfile.lock
2
2
  doc/
3
+ .yardoc/
3
4
  pkg/
4
5
  spec/bundle/*/Gemfile.lock
6
+ spec/bundle/*/.bundle/
5
7
  vendor/bundle/
8
+ tmp/
@@ -2,3 +2,4 @@ rvm:
2
2
  - 1.8.7
3
3
  - 1.9.2
4
4
  - 1.9.3
5
+ - 2.0.0
@@ -1,3 +1,13 @@
1
+ ### 0.3.1 / 2014-04-20
2
+
3
+ * Added thor ~> 0.18 as a dependency.
4
+ * No longer rely on the vendored version of thor within bundler.
5
+ * Store the timestamp of when `data/ruby-advisory-db` was last updated in
6
+ `data/ruby-advisory-db.ts`.
7
+ * Use `data/ruby-advisory-db.ts` instead of the creation time of the
8
+ `dataruby-advisory-db` directory, which is always the install time
9
+ of the rubygem.
10
+
1
11
  ### 0.3.0 / 2013-10-31
2
12
 
3
13
  * Added {Bundler::Audit::Database.update!} which uses `git` to download
data/README.md CHANGED
@@ -110,6 +110,8 @@ Update the [ruby-advisory-db] that `bundle-audit` uses:
110
110
 
111
111
  ## Requirements
112
112
 
113
+ * [RubyGems] >= 1.8
114
+ * [thor] ~> 0.18
113
115
  * [bundler] ~> 1.2
114
116
 
115
117
  ## Install
@@ -118,7 +120,7 @@ Update the [ruby-advisory-db] that `bundle-audit` uses:
118
120
 
119
121
  ## License
120
122
 
121
- Copyright (c) 2013 Hal Brodigan (postmodern.mod3 at gmail.com)
123
+ Copyright (c) 2013-2014 Hal Brodigan (postmodern.mod3 at gmail.com)
122
124
 
123
125
  bundler-audit is free software: you can redistribute it and/or modify
124
126
  it under the terms of the GNU General Public License as published by
@@ -133,6 +135,8 @@ GNU General Public License for more details.
133
135
  You should have received a copy of the GNU General Public License
134
136
  along with bundler-audit. If not, see <http://www.gnu.org/licenses/>.
135
137
 
138
+ [RubyGems]: https://rubygems.org
139
+ [thor]: http://whatisthor.com/
136
140
  [bundler]: https://github.com/carlhuda/bundler#readme
137
141
 
138
142
  [OSVDB]: http://osvdb.org/
data/Rakefile CHANGED
@@ -19,6 +19,7 @@ rescue Bundler::BundlerError => e
19
19
  end
20
20
 
21
21
  require 'rake'
22
+ require 'time'
22
23
 
23
24
  require 'rubygems/tasks'
24
25
  Gem::Tasks.new
@@ -26,11 +27,18 @@ Gem::Tasks.new
26
27
  namespace :db do
27
28
  desc 'Updates data/ruby-advisory-db'
28
29
  task :update do
30
+ timestamp = nil
31
+
29
32
  chdir 'data/ruby-advisory-db' do
30
33
  sh 'git', 'pull', 'origin', 'master'
34
+
35
+ File.open('../ruby-advisory-db.ts','w') do |file|
36
+ file.write Time.parse(`git log --pretty="%cd" -1`).utc
37
+ end
31
38
  end
32
39
 
33
40
  sh 'git', 'commit', 'data/ruby-advisory-db',
41
+ 'data/ruby-advisory-db.ts',
34
42
  '-m', 'Updated ruby-advisory-db'
35
43
  end
36
44
  end
@@ -0,0 +1 @@
1
+ 2014-02-11 00:45:58 UTC
@@ -12,3 +12,12 @@ Thanks,
12
12
  * [Larry W. Cashdollar](http://vapid.dhs.org/)
13
13
  * [Michael Grosser](https://github.com/grosser)
14
14
  * [Sascha Korth](https://github.com/skorth)
15
+ * [David Radcliffe](https://github.com/dwradcliffe)
16
+ * [Jörg Schiller](https://github.com/joergschiller)
17
+ * [Derek Prior](https://github.com/derekprior)
18
+ * [Joel Chippindale](https://github.com/mocoso)
19
+ * [Josef Šimánek](https://github.com/simi)
20
+ * [Amiel Martin](https://github.com/amiel)
21
+ * [Jeremy Olliver](https://github.com/jeremyolliver)
22
+ * [Vasily Vasinov](https://github.com/vasinov)
23
+ * [Phill MV](https://twitter.com/phillmv)
@@ -0,0 +1,20 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-6415
5
+ osvdb: 100524
6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/9WiRn2nhfq0
7
+ title: XSS Vulnerability in number_to_currency
8
+ date: 2013-12-03
9
+
10
+ description: |
11
+ There is an XSS vulnerability in the number_to_currency helper in Ruby on Raile.
12
+ The number_to_currency helper allows users to nicely format a numeric value. One
13
+ of the parameters to the helper (unit) is not escaped correctly. Applications
14
+ which pass user controlled data as the unit parameter are vulnerable to an XSS attack.
15
+
16
+ cvss_v2:
17
+
18
+ patched_versions:
19
+ - ~> 3.2.16
20
+ - ">= 4.0.2"
@@ -0,0 +1,21 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-6414
5
+ osvdb: 100525
6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/A-ebV4WxzKg
7
+ title: Denial of Service Vulnerability in Action View
8
+ date: 2013-12-03
9
+
10
+ description: |
11
+ There is a denial of service vulnerability in the header handling component of
12
+ Action View.
13
+
14
+ cvss_v2:
15
+
16
+ unaffected_versions:
17
+ - ~> 2.3.0
18
+
19
+ patched_versions:
20
+ - ~> 3.2.16
21
+ - ">= 4.0.2"
@@ -0,0 +1,27 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-6416
5
+ osvdb: 100526
6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/5ZI1-H5OoIM
7
+ title: XSS Vulnerability in simple_format helper
8
+ date: 2013-12-03
9
+
10
+ description: |
11
+ There is a vulnerability in the simple_format helper in Ruby on Rails.
12
+ The simple_format helper converts user supplied text into html text
13
+ which is intended to be safe for display. A change made to the
14
+ implementation of this helper means that any user provided HTML
15
+ attributes will not be escaped correctly. As a result of this error,
16
+ applications which pass user-controlled data to be included as html
17
+ attributes will be vulnerable to an XSS attack.
18
+
19
+ cvss_v2:
20
+
21
+ unaffected_versions:
22
+ - ~> 2.3.0
23
+ - ~> 3.1.0
24
+ - ~> 3.2.0
25
+
26
+ patched_versions:
27
+ - ">= 4.0.2"
@@ -0,0 +1,24 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-6417
5
+ osvdb: 100527
6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4
7
+ title: Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)
8
+ date: 2013-12-03
9
+
10
+ description: |
11
+ The prior fix to CVE-2013-0155 was incomplete and the use of common
12
+ 3rd party libraries can accidentally circumvent the protection. Due
13
+ to the way that Rack::Request and Rails::Request interact, it is
14
+ possible for a 3rd party or custom rack middleware to parse the
15
+ parameters insecurely and store them in the same key that Rails uses
16
+ for its own parameters. In the event that happens the application
17
+ will receive unsafe parameters and could be vulnerable to the earlier
18
+ vulnerability.
19
+
20
+ cvss_v2:
21
+
22
+ patched_versions:
23
+ - ~> 3.2.16
24
+ - ">= 4.0.2"
@@ -0,0 +1,22 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-4491
5
+ osvdb: 100528
6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
7
+ title: Reflective XSS Vulnerability in Ruby on Rails
8
+ date: 2013-12-03
9
+
10
+ description: |
11
+ There is a vulnerability in the internationalization component of Ruby on
12
+ Rails. Under certain common configurations an attacker can provide specially
13
+ crafted input which will execute a reflective XSS attack.
14
+
15
+ The root cause of this issue is a vulnerability in the i18n gem which has
16
+ been assigned the identifier CVE-2013-4492.
17
+
18
+ cvss_v2:
19
+
20
+ patched_versions:
21
+ - ~> 3.2.16
22
+ - ">= 4.0.2"
@@ -0,0 +1,24 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2014-0081
5
+ osvdb: 103439
6
+ url: http://osvdb.org/show/osvdb/103439
7
+ title: XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human
8
+ date: 2014-02-18
9
+
10
+ description: |
11
+ Ruby on Rails contains a flaw that allows a cross-site scripting (XSS) attack.
12
+ This flaw exists because the actionpack/lib/action_view/helpers/number_helper.rb
13
+ script does not validate input to the 'number_to_currency', 'number_to_percentage',
14
+ and 'number_to_human' helpers before returning it to users. This may allow a
15
+ remote attacker to create a specially crafted request that would execute arbitrary
16
+ script code in a user's browser session within the trust relationship between
17
+ their browser and the server.
18
+
19
+ cvss_v2:
20
+
21
+ patched_versions:
22
+ - ~> 3.2.17
23
+ - ~> 4.0.3
24
+ - ">= 4.1.0.beta2"
@@ -0,0 +1,22 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2014-0082
5
+ osvdb: 103440
6
+ url: http://osvdb.org/show/osvdb/103440
7
+ title: Denial of Service Vulnerability in Action View when using render :text
8
+ date: 2014-02-18
9
+
10
+ description: |
11
+ Ruby on Rails contains a flaw in actionpack/lib/action_view/template/text.rb
12
+ in the text rendering component of Action View that is triggered when
13
+ handling MIME types that are converted to symbols. This may allow a
14
+ remote attacker to cause a denial of service.
15
+
16
+ cvss_v2:
17
+
18
+ unaffected_versions:
19
+ - ~> 4.0.0
20
+
21
+ patched_versions:
22
+ - ">= 3.2.17"
@@ -0,0 +1,23 @@
1
+ ---
2
+ gem: activerecord
3
+ framework: rails
4
+ cve: 2014-0080
5
+ osvdb: 103438
6
+ url: http://osvdb.org/show/osvdb/103438
7
+ title: Data Injection Vulnerability in Active Record
8
+ date: 2014-02-18
9
+
10
+ description: |
11
+ Ruby on Rails contains a flaw in connection_adapters/postgresql/cast.rb
12
+ in Active Record. This issue may allow a remote attacker to inject data
13
+ into PostgreSQL array columns via a specially crafted string.
14
+
15
+ cvss_v2:
16
+
17
+ unaffected_versions:
18
+ - "< 3.2.0"
19
+ - ~> 3.2.0
20
+
21
+ patched_versions:
22
+ - ~> 4.0.3
23
+ - ">= 4.1.0.beta2"
@@ -0,0 +1,15 @@
1
+ ---
2
+ gem: Arabic-Prawn
3
+ osvdb: 104365
4
+ url: http://osvdb.org/show/osvdb/104365
5
+ title: Arabic-Prawn Gem for Ruby contains a flaw
6
+ date: 2014-03-10
7
+
8
+ description: |
9
+ Arabic Prawn Gem for Ruby contains a flaw in the lib/string_utf_support.rb
10
+ file. The issue is due to the program failing to sanitize user input. This may
11
+ allow a remote attacker to inject arbitrary commands.
12
+
13
+ cvss_v2:
14
+
15
+ patched_versions:
@@ -8,8 +8,8 @@ date: 2013-10-22
8
8
  description: Cocaine Gem for Ruby contains a flaw that is due to the method
9
9
  of variable interpolation used by the program. With a specially crafted
10
10
  object, a context-dependent attacker can execute arbitrary commands.
11
- cvss_v2:
11
+ cvss_v2: 6.8
12
12
  unaffected_versions:
13
- - ~> 0.3.0
13
+ - < 0.4.0
14
14
  patched_versions:
15
15
  - '>= 0.5.3'
@@ -10,7 +10,7 @@ description: |
10
10
  context-dependent attacker to potentially execute arbitrary code.
11
11
  date: 2013-01-09
12
12
 
13
- cvss_v2: 9.3
13
+ cvss_v2: 7.5
14
14
 
15
15
  patched_versions:
16
16
  - ">= 0.3.2"
@@ -8,5 +8,5 @@ date: 2013-03-12
8
8
 
9
9
  description: Curl Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via the URL. This may allow a context-dependent attacker to potentially execute arbitrary commands by injecting them via a semi-colon (;).
10
10
 
11
- cvss_v2: 9.3
11
+ cvss_v2: 7.5
12
12
 
@@ -0,0 +1,11 @@
1
+ ---
2
+ gem: echor
3
+ osvdb: 102129
4
+ url: http://osvdb.org/show/osvdb/102129
5
+ title: Echor Gem for Ruby contains a flaw
6
+ date: 2014-01-14
7
+ description: Echor Gem for Ruby contains a flaw in backplane.rb in the perform_request function that is triggered when
8
+ a semi-colon (;) is injected into a username or password. This may allow a context-dependent attacker to inject
9
+ arbitrary commands if the gem is used in a rails application.
10
+ cvss_v2:
11
+ patched_versions:
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: echor
3
+ osvdb: 102130
4
+ url: http://osvdb.org/show/osvdb/102130
5
+ title: Echor Gem for Ruby contains a flaw
6
+ date: 2014-01-14
7
+ description: Echor Gem for Ruby contains a flaw that is due to the program exposing credential information in the
8
+ system process listing. This may allow a local attacker to gain access to plaintext credential information.
9
+ cvss_v2:
10
+ patched_versions:
@@ -0,0 +1,14 @@
1
+ ---
2
+ gem: gitlab-grit
3
+ cve: 2013-4489
4
+ osvdb: 99370
5
+ url: http://www.osvdb.org/show/osvdb/99370
6
+ title: GitLab Grit Gem for Ruby contains a flaw
7
+ date: 2013-11-04
8
+ description: GitLab Grit Gem for Ruby contains a flaw in the app/contexts/search_context.rb script.
9
+ The issue is triggered when input passed via the code search box is not properly sanitized,
10
+ which allows strings to be evaluated by the Bourne shell. This may allow a remote attacker to
11
+ execute arbitrary commands.
12
+ cvss_v2:
13
+ patched_versions:
14
+ - '>= 2.6.1'
@@ -1,19 +1,14 @@
1
1
  ---
2
2
  gem: httparty
3
- cve: 2013-1802
3
+ cve: 2013-1801
4
4
  osvdb: 90741
5
5
  url: http://osvdb.org/show/osvdb/90741
6
- title:
7
- httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
6
+ title: httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
8
7
  date: 2013-01-14
9
-
10
8
  description: |
11
9
  httparty Gem for Ruby contains a flaw that is triggered when a type casting
12
10
  error occurs during the parsing of parameters. This may allow a
13
11
  context-dependent attacker to potentially execute arbitrary code.
14
-
15
- cvss_v2: 9.3
16
-
12
+ cvss_v2: 7.5
17
13
  patched_versions:
18
14
  - ">= 0.10.0"
19
-
@@ -0,0 +1,17 @@
1
+ ---
2
+ gem: i18n
3
+ cve: 2013-4492
4
+ osvdb: 100528
5
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
6
+ title: i18n missing translation error message XSS
7
+ date: 2013-12-03
8
+
9
+ description: |
10
+ The HTML exception message raised by I18n::MissingTranslation fails
11
+ to escape the keys.
12
+
13
+ cvss_v2: 4.3
14
+
15
+ patched_versions:
16
+ - ~> 0.5.1
17
+ - '>= 0.6.6'
@@ -0,0 +1,12 @@
1
+ ---
2
+ gem: nokogiri
3
+ cve: 2013-6460
4
+ osvdb: 101179
5
+ url: http://www.osvdb.org/show/osvdb/101179
6
+ title: Nokogiri Gem for JRuby Crafted XML Document Handling Infinite Loop Remote DoS
7
+ date: 2013-12-14
8
+ description: Nokogiri Gem for JRuby contains a flaw that may allow a remote denial of service. The issue is triggered when handling a specially crafted XML document, which can result in an infinite loop. This may allow a context-dependent attacker to crash the server.
9
+ cvss_v2:
10
+ patched_versions:
11
+ - ~> 1.5.11
12
+ - ">= 1.6.1"