codesake-dawn 1.0.0.rc1 → 1.0.0.rc2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.travis.yml +0 -2
- data/Changelog.md +10 -2
- data/Roadmap.md +24 -1
- data/lib/codesake/dawn/kb/basic_check.rb +12 -1
- data/lib/codesake/dawn/kb/cve_2013_0256.rb +61 -0
- data/lib/codesake/dawn/kb/cve_2013_0263.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_2119.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_5647.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_6459.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_7086.rb +29 -0
- data/lib/codesake/dawn/knowledge_base.rb +15 -0
- data/lib/codesake/dawn/version.rb +2 -2
- data/spec/lib/dawn/codesake_knowledgebase_spec.rb +30 -0
- data/spec/lib/kb/cve_2013_0256_spec.rb +8 -0
- data/spec/lib/kb/cve_2013_0263_spec.rb +8 -0
- data/spec/lib/kb/cve_2013_2119_spec.rb +8 -0
- data/spec/lib/kb/cve_2013_5647_spec.rb +8 -0
- data/spec/lib/kb/cve_2013_6459_spec.rb +8 -0
- data/spec/lib/kb/cve_2013_7086_spec.rb +22 -0
- metadata +20 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ead6f235a382b5141ff5b4deb9c378820bac7c9f
|
4
|
+
data.tar.gz: 1e4aa5deac922e50082aed79bae96206316da310
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b3e0e711990a83280b447c164592644cd2844ff32ca4feecc391a33a849b6baee36162e09996e01c82a4974eadc082e27560e3c5f85cbf64c58971610d27e68e
|
7
|
+
data.tar.gz: f24b24415371c204bccf23dcb975b7a795dc228738256f40324c95455e966d0f8d4dd8f981e84b6bddebc12cc0c6330eb3e29124739d5679087f79ed3ed69028
|
data/.travis.yml
CHANGED
data/Changelog.md
CHANGED
@@ -5,9 +5,9 @@ It supports [Sinatra](http://www.sinatrarb.com),
|
|
5
5
|
[Padrino](http://www.padrinorb.com) and [Ruby on Rails](http://rubyonrails.org)
|
6
6
|
frameworks.
|
7
7
|
|
8
|
-
_latest update:
|
8
|
+
_latest update: Fri Jan 10 08:53:06 CET 2014_
|
9
9
|
|
10
|
-
## Version 1.0.0 - codename: Lightning McQueen (2014-01-
|
10
|
+
## Version 1.0.0 - codename: Lightning McQueen (2014-01-xx)
|
11
11
|
|
12
12
|
* Fixing issue #19 (https://github.com/codesake/codesake-dawn/issues/19). There
|
13
13
|
was a problem on ```is_a_vulnerable_version?``` routine that flags a security
|
@@ -21,6 +21,8 @@ _latest update: Wed Jan 8 23:50:05 CET 2014_
|
|
21
21
|
* Added a rake task to better integrate codesake-dawn in a continous
|
22
22
|
development workflow. Now when you install codesake-dawn you have a 'rake
|
23
23
|
dawn' task executing the tool on the current directory.
|
24
|
+
* In BasicCheck::is_vulnerable_version? Added support for the fourth version
|
25
|
+
number. We needed this to implement check for CVE-2013-7086
|
24
26
|
* Added a check for CVE-2004-0755
|
25
27
|
* Added a check for CVE-2004-0983
|
26
28
|
* Added a check for CVE-2005-1992
|
@@ -70,7 +72,13 @@ _latest update: Wed Jan 8 23:50:05 CET 2014_
|
|
70
72
|
* Added a check for CVE-2011-3009
|
71
73
|
* Added a check for CVE-2011-3187
|
72
74
|
* Added a check for CVE-2011-4319
|
75
|
+
* Added a check for CVE-2013-0256
|
76
|
+
* Added a check for CVE-2013-0263
|
73
77
|
* Added a check for CVE-2013-2090
|
78
|
+
* Added a check for CVE-2013-2119
|
79
|
+
* Added a check for CVE-2013-5647
|
80
|
+
* Added a check for CVE-2013-6459
|
81
|
+
* Added a check for CVE-2013-7086
|
74
82
|
|
75
83
|
|
76
84
|
## Version 0.85 - codename: elevator (2013-12-17)
|
data/Roadmap.md
CHANGED
@@ -7,10 +7,33 @@ frameworks.
|
|
7
7
|
|
8
8
|
This is an ongoing roadmap for the dawn source code review tool.
|
9
9
|
|
10
|
-
_latest update:
|
10
|
+
_latest update: Fri Jan 10 17:06:04 CET 2014_
|
11
|
+
|
12
|
+
## Version 1.0.0
|
13
|
+
|
14
|
+
* CVE-2013-2119
|
15
|
+
* CVE-2013-1756
|
16
|
+
* CVE-2013-0162
|
17
|
+
* CVE-2012-2671
|
18
|
+
* CVE-2012-2139
|
19
|
+
* CVE-2012-1098
|
20
|
+
* CVE-2007-6183
|
11
21
|
|
12
22
|
## Version 1.1.0
|
13
23
|
|
24
|
+
* CVE-2014-1234
|
25
|
+
* CVE-2014-1233
|
26
|
+
* CVE-2013-5671
|
27
|
+
* CVE-2013-4593
|
28
|
+
* CVE-2013-4489
|
29
|
+
* CVE-2013-4413
|
30
|
+
* CVE-2013-2516
|
31
|
+
* CVE-2013-2513
|
32
|
+
* CVE-2013-2512
|
33
|
+
* CVE-2013-1607
|
34
|
+
* move is\_vulnerable\_version? and is\_vulnerable\_patchlevel? to an adhoc class handling version comparison
|
35
|
+
* add @rubysec vulnerability database integration using rake
|
36
|
+
* create a task to check for new CVE in NVD website
|
14
37
|
* add a language check. It will handle a ruby script as input and a ruby\_parser line as unsafe pattern. It will compile the ruby and look for the unsafe pattern
|
15
38
|
* add a check against deprecated ruby / gems version. I will handle MVC gems right now.
|
16
39
|
|
@@ -115,11 +115,22 @@ module Codesake
|
|
115
115
|
fixes.each do |fv|
|
116
116
|
fixes_v_array = fv.split(".").map! { |n| n.to_i }
|
117
117
|
|
118
|
+
debug_me "target_array = #{target_v_array}"
|
119
|
+
debug_me "fixes_array = #{fixes_v_array}"
|
118
120
|
if target_v_array[0] == fixes_v_array[0]
|
119
121
|
ret = true if target_v_array[1] < fixes_v_array[1] # same major but previous minor
|
120
122
|
if target_v_array[1] == fixes_v_array[1]
|
121
123
|
ret = true if target_v_array[2] < fixes_v_array[2]
|
122
|
-
|
124
|
+
# In order to support CVE-2013-7086 security check we must be able to
|
125
|
+
# hande the 'fourth' version number -> 1.5.0.4
|
126
|
+
debug_me "target array count = #{target_v_array.count}"
|
127
|
+
debug_me "fixes array count = #{fixes_v_array.count}"
|
128
|
+
debug_me "same patchlevel?: #{(target_v_array[2] == fixes_v_array[2])}"
|
129
|
+
if (target_v_array[2] == fixes_v_array[2]) && target_v_array.count == 4 && fixes_v_array.count == 4
|
130
|
+
ret = true if target_v_array[3] < fixes_v_array[3]
|
131
|
+
ret = false if target_v_array[3] >= fixes_v_array[3]
|
132
|
+
end
|
133
|
+
ret = false if target_v_array[2] > fixes_v_array[2]
|
123
134
|
|
124
135
|
end
|
125
136
|
end
|
@@ -0,0 +1,61 @@
|
|
1
|
+
module Codesake
|
2
|
+
module Dawn
|
3
|
+
module Kb
|
4
|
+
# Automatically created with rake on 2014-01-14
|
5
|
+
class CVE_2013_0256_a
|
6
|
+
|
7
|
+
include DependencyCheck
|
8
|
+
|
9
|
+
def initialize
|
10
|
+
message = "CVE_2013_0256_b: rdoc gem is vulnerable"
|
11
|
+
|
12
|
+
super({
|
13
|
+
:name=>"CVE-2013-0256-b",
|
14
|
+
:kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
|
15
|
+
})
|
16
|
+
|
17
|
+
self.safe_dependencies = [{:name=>"rdoc", :version=>['2.3.1', '3.13', '4.0.0']}]
|
18
|
+
|
19
|
+
end
|
20
|
+
end
|
21
|
+
class CVE_2013_0256_b
|
22
|
+
include RubyVersionCheck
|
23
|
+
def initialize
|
24
|
+
message = "CVE_2013_0256_b: ruby 1.9.x before 1.9.3-p383 and 2.0.0 before rc2 have problems"
|
25
|
+
super({
|
26
|
+
:name=>"CVE-2013-0256-b",
|
27
|
+
:kind=>Codesake::Dawn::KnowledgeBase::RUBY_VERSION_CHECK,
|
28
|
+
})
|
29
|
+
self.safe_rubies = [
|
30
|
+
{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"p383"},
|
31
|
+
{:engine=>"ruby", :version=>"2.0.0", :patchlevel=>"p0"}
|
32
|
+
]
|
33
|
+
end
|
34
|
+
|
35
|
+
|
36
|
+
end
|
37
|
+
|
38
|
+
class CVE_2013_0256
|
39
|
+
include ComboCheck
|
40
|
+
|
41
|
+
def initialize
|
42
|
+
message = "darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL."
|
43
|
+
super({
|
44
|
+
:name=>"CVE-2013-0256",
|
45
|
+
:cvss=>"AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
46
|
+
:release_date => Date.new(2013, 3, 1),
|
47
|
+
:cwe=>"79",
|
48
|
+
:owasp=>"A3",
|
49
|
+
:applies=>["sinatra", "padrino", "rails"],
|
50
|
+
:kind=>Codesake::Dawn::KnowledgeBase::COMBO_CHECK,
|
51
|
+
:message=>message,
|
52
|
+
:mitigation=>"Please upgrade rdoc version at least to 2.3.1, 3.13 or 4.0.0. As a general rule, using the latest stable version is recommended.",
|
53
|
+
:aux_links=>["http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2"],
|
54
|
+
:checks=>[CVE_2013_0256_a.new, CVE_2013_0256_b.new]
|
55
|
+
})
|
56
|
+
|
57
|
+
end
|
58
|
+
end
|
59
|
+
end
|
60
|
+
end
|
61
|
+
end
|
@@ -0,0 +1,29 @@
|
|
1
|
+
module Codesake
|
2
|
+
module Dawn
|
3
|
+
module Kb
|
4
|
+
# Automatically created with rake on 2014-01-14
|
5
|
+
class CVE_2013_0263
|
6
|
+
include DependencyCheck
|
7
|
+
|
8
|
+
def initialize
|
9
|
+
message = "Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time."
|
10
|
+
super({
|
11
|
+
:name=>"CVE-2013-0263",
|
12
|
+
:cvss=>"AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
13
|
+
:release_date => Date.new(2013, 8, 2),
|
14
|
+
:cwe=>"",
|
15
|
+
:owasp=>"A9",
|
16
|
+
:applies=>["sinatra", "padrino", "rails"],
|
17
|
+
:kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
|
18
|
+
:message=>message,
|
19
|
+
:mitigation=>"Please upgrade rack version to 1.5.2, 1.4.5, 1.3.10, 1.2.8, 1.1.6 As a general rule, using the latest stable version is recommended.",
|
20
|
+
:aux_links=>["https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ"]
|
21
|
+
})
|
22
|
+
|
23
|
+
self.safe_dependencies = [{:name=>"rack", :version=>['1.5.2', '1.4.5', '1.3.10', '1.2.8', '1.1.6']}]
|
24
|
+
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
@@ -0,0 +1,29 @@
|
|
1
|
+
module Codesake
|
2
|
+
module Dawn
|
3
|
+
module Kb
|
4
|
+
# Automatically created with rake on 2014-01-10
|
5
|
+
class CVE_2013_2119
|
6
|
+
include DependencyCheck
|
7
|
+
|
8
|
+
def initialize
|
9
|
+
message = "Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary \"config\" file in a directory with a predictable name in /tmp/ before it is used by the gem."
|
10
|
+
super({
|
11
|
+
:name=>"CVE-2013-2119",
|
12
|
+
:cvss=>"AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
13
|
+
:release_date => Date.new(2014, 1, 3),
|
14
|
+
:cwe=>"16",
|
15
|
+
:owasp=>"A9",
|
16
|
+
:applies=>["rails", "sinatra", "padrino"],
|
17
|
+
:kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
|
18
|
+
:message=>message,
|
19
|
+
:mitigation=>"Please upgrade passenger to version 3.0.21, 4.0.5 or above",
|
20
|
+
:aux_links=>["http://blog.phusion.nl/2013/05/29/phusion-passenger-4-0-5-released/", "http://blog.phusion.nl/2013/05/29/phusion-passenger-3-0-21-released/"]
|
21
|
+
})
|
22
|
+
|
23
|
+
self.safe_dependencies = [{:name=>"passenger", :version=>['4.0.5', '3.0.21']}]
|
24
|
+
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
@@ -0,0 +1,30 @@
|
|
1
|
+
module Codesake
|
2
|
+
module Dawn
|
3
|
+
module Kb
|
4
|
+
# Automatically created with rake on 2014-01-14
|
5
|
+
class CVE_2013_5647
|
6
|
+
include DependencyCheck
|
7
|
+
|
8
|
+
def initialize
|
9
|
+
message = "lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename."
|
10
|
+
|
11
|
+
super({
|
12
|
+
:name=>"CVE-2013-5647",
|
13
|
+
:cvss=>"AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
14
|
+
:release_date => Date.new(2013, 8, 29),
|
15
|
+
:cwe=>"94",
|
16
|
+
:owasp=>"A9",
|
17
|
+
:applies=>["sinatra", "padrino", "rails"],
|
18
|
+
:kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
|
19
|
+
:message=>message,
|
20
|
+
:mitigation=>"Please upgrade sounder version up to 1.0.1. As a general rule, using the latest stable version is recommended.",
|
21
|
+
:aux_links=>["http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html"]
|
22
|
+
})
|
23
|
+
|
24
|
+
self.safe_dependencies = [{:name=>"sounder", :version=>['1.0.2']}]
|
25
|
+
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
@@ -0,0 +1,30 @@
|
|
1
|
+
module Codesake
|
2
|
+
module Dawn
|
3
|
+
module Kb
|
4
|
+
# Automatically created with rake on 2014-01-14
|
5
|
+
class CVE_2013_6459
|
6
|
+
include DependencyCheck
|
7
|
+
|
8
|
+
def initialize
|
9
|
+
message = "Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via vectors involving generated pagination links."
|
10
|
+
|
11
|
+
super({
|
12
|
+
:name=>"CVE-2013-6459",
|
13
|
+
:cvss=>"AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
14
|
+
:release_date => Date.new(2013, 12, 31),
|
15
|
+
:cwe=>"79",
|
16
|
+
:owasp=>"A3",
|
17
|
+
:applies=>["sinatra", "padrino", "rails"],
|
18
|
+
:kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
|
19
|
+
:message=>message,
|
20
|
+
:mitigation=>"Please upgrade will_paginage version to 3.0.5. As a general rule, using the latest stable version is recommended.",
|
21
|
+
:aux_links=>["https://github.com/mislav/will_paginate/releases/tag/v3.0.5"]
|
22
|
+
})
|
23
|
+
|
24
|
+
self.safe_dependencies = [{:name=>"will_paginate", :version=>['3.0.5']}]
|
25
|
+
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
@@ -0,0 +1,29 @@
|
|
1
|
+
module Codesake
|
2
|
+
module Dawn
|
3
|
+
module Kb
|
4
|
+
# Automatically created with rake on 2014-01-10
|
5
|
+
class CVE_2013_7086
|
6
|
+
include DependencyCheck
|
7
|
+
|
8
|
+
def initialize
|
9
|
+
message = "The message function in lib/webbynode/notify.rb in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message."
|
10
|
+
super({
|
11
|
+
:name=>"CVE-2013-7086",
|
12
|
+
:cvss=>"AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
13
|
+
:release_date => Date.new(2013, 12, 19),
|
14
|
+
:cwe=>"94",
|
15
|
+
:owasp=>"A9",
|
16
|
+
:applies=>["rails", "sinatra", "padrino"],
|
17
|
+
:kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
|
18
|
+
:message=>message,
|
19
|
+
:mitigation=>"Please upgrade webbynode up to version 1.0.5.3",
|
20
|
+
:aux_links=>["http://xforce.iss.net/xforce/xfdb/89705"]
|
21
|
+
})
|
22
|
+
|
23
|
+
self.safe_dependencies = [{:name=>"webbynode", :version=>['1.0.5.4']}]
|
24
|
+
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
@@ -129,6 +129,8 @@ require "codesake/dawn/kb/cve_2013_0155"
|
|
129
129
|
require "codesake/dawn/kb/cve_2013_0156"
|
130
130
|
require "codesake/dawn/kb/cve_2013_0175"
|
131
131
|
require "codesake/dawn/kb/cve_2013_0233"
|
132
|
+
require "codesake/dawn/kb/cve_2013_0256"
|
133
|
+
require "codesake/dawn/kb/cve_2013_0263"
|
132
134
|
require "codesake/dawn/kb/cve_2013_0269"
|
133
135
|
require "codesake/dawn/kb/cve_2013_0276"
|
134
136
|
require "codesake/dawn/kb/cve_2013_0277"
|
@@ -154,6 +156,7 @@ require "codesake/dawn/kb/cve_2013_1947"
|
|
154
156
|
require "codesake/dawn/kb/cve_2013_1948"
|
155
157
|
require "codesake/dawn/kb/cve_2013_2065"
|
156
158
|
require "codesake/dawn/kb/cve_2013_2090"
|
159
|
+
require "codesake/dawn/kb/cve_2013_2119"
|
157
160
|
require "codesake/dawn/kb/cve_2013_2615"
|
158
161
|
require "codesake/dawn/kb/cve_2013_2616"
|
159
162
|
require "codesake/dawn/kb/cve_2013_2617"
|
@@ -166,11 +169,17 @@ require "codesake/dawn/kb/cve_2013_4479"
|
|
166
169
|
require "codesake/dawn/kb/cve_2013_4491"
|
167
170
|
require "codesake/dawn/kb/cve_2013_4492"
|
168
171
|
require "codesake/dawn/kb/cve_2013_4562"
|
172
|
+
require "codesake/dawn/kb/cve_2013_5647"
|
169
173
|
require "codesake/dawn/kb/cve_2013_6414"
|
170
174
|
require "codesake/dawn/kb/cve_2013_6415"
|
171
175
|
require "codesake/dawn/kb/cve_2013_6416"
|
172
176
|
require "codesake/dawn/kb/cve_2013_6417"
|
173
177
|
require "codesake/dawn/kb/cve_2013_6421"
|
178
|
+
require "codesake/dawn/kb/cve_2013_6459"
|
179
|
+
require "codesake/dawn/kb/cve_2013_7086"
|
180
|
+
|
181
|
+
# CVE - 2014
|
182
|
+
# require "codesake/dawn/kb/cve_2014_1234"
|
174
183
|
|
175
184
|
|
176
185
|
module Codesake
|
@@ -323,6 +332,8 @@ module Codesake
|
|
323
332
|
Codesake::Dawn::Kb::CVE_2013_0156.new,
|
324
333
|
Codesake::Dawn::Kb::CVE_2013_0175.new,
|
325
334
|
Codesake::Dawn::Kb::CVE_2013_0233.new,
|
335
|
+
Codesake::Dawn::Kb::CVE_2013_0256.new,
|
336
|
+
Codesake::Dawn::Kb::CVE_2013_0263.new,
|
326
337
|
Codesake::Dawn::Kb::CVE_2013_0269.new,
|
327
338
|
Codesake::Dawn::Kb::CVE_2013_0276.new,
|
328
339
|
Codesake::Dawn::Kb::CVE_2013_0277.new,
|
@@ -348,6 +359,7 @@ module Codesake
|
|
348
359
|
Codesake::Dawn::Kb::CVE_2013_1948.new,
|
349
360
|
Codesake::Dawn::Kb::CVE_2013_2065.new,
|
350
361
|
Codesake::Dawn::Kb::CVE_2013_2090.new,
|
362
|
+
Codesake::Dawn::Kb::CVE_2013_2119.new,
|
351
363
|
Codesake::Dawn::Kb::CVE_2013_2615.new,
|
352
364
|
Codesake::Dawn::Kb::CVE_2013_2616.new,
|
353
365
|
Codesake::Dawn::Kb::CVE_2013_2617.new,
|
@@ -360,11 +372,14 @@ module Codesake
|
|
360
372
|
Codesake::Dawn::Kb::CVE_2013_4491.new,
|
361
373
|
Codesake::Dawn::Kb::CVE_2013_4492.new,
|
362
374
|
Codesake::Dawn::Kb::CVE_2013_4562.new,
|
375
|
+
Codesake::Dawn::Kb::CVE_2013_5647.new,
|
363
376
|
Codesake::Dawn::Kb::CVE_2013_6414.new,
|
364
377
|
Codesake::Dawn::Kb::CVE_2013_6415.new,
|
365
378
|
Codesake::Dawn::Kb::CVE_2013_6416.new,
|
366
379
|
Codesake::Dawn::Kb::CVE_2013_6417.new,
|
367
380
|
Codesake::Dawn::Kb::CVE_2013_6421.new,
|
381
|
+
Codesake::Dawn::Kb::CVE_2013_6459.new,
|
382
|
+
Codesake::Dawn::Kb::CVE_2013_7086.new,
|
368
383
|
|
369
384
|
]
|
370
385
|
end
|
@@ -712,5 +712,35 @@ end
|
|
712
712
|
sc = kb.find("CVE-2007-5162")
|
713
713
|
sc.should_not be_nil
|
714
714
|
sc.class.should == Codesake::Dawn::Kb::CVE_2007_5162
|
715
|
+
end
|
716
|
+
it "must have test for CVE-2013-2119" do
|
717
|
+
sc = kb.find("CVE-2013-2119")
|
718
|
+
sc.should_not be_nil
|
719
|
+
sc.class.should == Codesake::Dawn::Kb::CVE_2013_2119
|
720
|
+
end
|
721
|
+
it "must have test for CVE-2013-7086" do
|
722
|
+
sc = kb.find("CVE-2013-7086")
|
723
|
+
sc.should_not be_nil
|
724
|
+
sc.class.should == Codesake::Dawn::Kb::CVE_2013_7086
|
725
|
+
end
|
726
|
+
it "must have test for CVE-2013-6459" do
|
727
|
+
sc = kb.find("CVE-2013-6459")
|
728
|
+
sc.should_not be_nil
|
729
|
+
sc.class.should == Codesake::Dawn::Kb::CVE_2013_6459
|
730
|
+
end
|
731
|
+
it "must have test for CVE-2013-5647" do
|
732
|
+
sc = kb.find("CVE-2013-5647")
|
733
|
+
sc.should_not be_nil
|
734
|
+
sc.class.should == Codesake::Dawn::Kb::CVE_2013_5647
|
735
|
+
end
|
736
|
+
it "must have test for CVE-2013-0263" do
|
737
|
+
sc = kb.find("CVE-2013-0263")
|
738
|
+
sc.should_not be_nil
|
739
|
+
sc.class.should == Codesake::Dawn::Kb::CVE_2013_0263
|
740
|
+
end
|
741
|
+
it "must have test for CVE-2013-0256" do
|
742
|
+
sc = kb.find("CVE-2013-0256")
|
743
|
+
sc.should_not be_nil
|
744
|
+
sc.class.should == Codesake::Dawn::Kb::CVE_2013_0256
|
715
745
|
end
|
716
746
|
end
|
@@ -0,0 +1,22 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-7086 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_7086.new
|
5
|
+
@check.debug = true
|
6
|
+
end
|
7
|
+
it "is detected for gem 1.0.5.3" do
|
8
|
+
@check.dependencies = [{:name=>"webbynode", :version=>'1.0.5.3'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
|
12
|
+
it "is detected for gem 1.0.4.3" do
|
13
|
+
@check.dependencies = [{:name=>"webbynode", :version=>'1.0.4.3'}]
|
14
|
+
@check.vuln?.should be_true
|
15
|
+
end
|
16
|
+
|
17
|
+
it "is not detected for gem 1.0.5.4" do
|
18
|
+
@check.dependencies = [{:name=>"webbynode", :version=>'1.0.5.4'}]
|
19
|
+
@check.vuln?.should be_false
|
20
|
+
end
|
21
|
+
|
22
|
+
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: codesake-dawn
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.0.0.
|
4
|
+
version: 1.0.0.rc2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Paolo Perego
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2014-01-
|
11
|
+
date: 2014-01-14 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: codesake-commons
|
@@ -324,6 +324,8 @@ files:
|
|
324
324
|
- lib/codesake/dawn/kb/cve_2013_0156.rb
|
325
325
|
- lib/codesake/dawn/kb/cve_2013_0175.rb
|
326
326
|
- lib/codesake/dawn/kb/cve_2013_0233.rb
|
327
|
+
- lib/codesake/dawn/kb/cve_2013_0256.rb
|
328
|
+
- lib/codesake/dawn/kb/cve_2013_0263.rb
|
327
329
|
- lib/codesake/dawn/kb/cve_2013_0269.rb
|
328
330
|
- lib/codesake/dawn/kb/cve_2013_0276.rb
|
329
331
|
- lib/codesake/dawn/kb/cve_2013_0277.rb
|
@@ -349,6 +351,7 @@ files:
|
|
349
351
|
- lib/codesake/dawn/kb/cve_2013_1948.rb
|
350
352
|
- lib/codesake/dawn/kb/cve_2013_2065.rb
|
351
353
|
- lib/codesake/dawn/kb/cve_2013_2090.rb
|
354
|
+
- lib/codesake/dawn/kb/cve_2013_2119.rb
|
352
355
|
- lib/codesake/dawn/kb/cve_2013_2615.rb
|
353
356
|
- lib/codesake/dawn/kb/cve_2013_2616.rb
|
354
357
|
- lib/codesake/dawn/kb/cve_2013_2617.rb
|
@@ -361,11 +364,14 @@ files:
|
|
361
364
|
- lib/codesake/dawn/kb/cve_2013_4491.rb
|
362
365
|
- lib/codesake/dawn/kb/cve_2013_4492.rb
|
363
366
|
- lib/codesake/dawn/kb/cve_2013_4562.rb
|
367
|
+
- lib/codesake/dawn/kb/cve_2013_5647.rb
|
364
368
|
- lib/codesake/dawn/kb/cve_2013_6414.rb
|
365
369
|
- lib/codesake/dawn/kb/cve_2013_6415.rb
|
366
370
|
- lib/codesake/dawn/kb/cve_2013_6416.rb
|
367
371
|
- lib/codesake/dawn/kb/cve_2013_6417.rb
|
368
372
|
- lib/codesake/dawn/kb/cve_2013_6421.rb
|
373
|
+
- lib/codesake/dawn/kb/cve_2013_6459.rb
|
374
|
+
- lib/codesake/dawn/kb/cve_2013_7086.rb
|
369
375
|
- lib/codesake/dawn/kb/dependency_check.rb
|
370
376
|
- lib/codesake/dawn/kb/nokogiri_dos_20131217.rb
|
371
377
|
- lib/codesake/dawn/kb/nokogiri_entityexpansion_dos_20131217.rb
|
@@ -444,7 +450,13 @@ files:
|
|
444
450
|
- spec/lib/kb/cve_2011_3009_spec.rb
|
445
451
|
- spec/lib/kb/cve_2011_3187_spec.rb
|
446
452
|
- spec/lib/kb/cve_2011_4319_spec.rb
|
453
|
+
- spec/lib/kb/cve_2013_0256_spec.rb
|
454
|
+
- spec/lib/kb/cve_2013_0263_spec.rb
|
447
455
|
- spec/lib/kb/cve_2013_2090_spec.rb
|
456
|
+
- spec/lib/kb/cve_2013_2119_spec.rb
|
457
|
+
- spec/lib/kb/cve_2013_5647_spec.rb
|
458
|
+
- spec/lib/kb/cve_2013_6459_spec.rb
|
459
|
+
- spec/lib/kb/cve_2013_7086_spec.rb
|
448
460
|
- spec/lib/kb/owasp_ror_cheatsheet_disabled.rb
|
449
461
|
- spec/spec_helper.rb
|
450
462
|
homepage: http://dawn.codesake.com
|
@@ -534,6 +546,12 @@ test_files:
|
|
534
546
|
- spec/lib/kb/cve_2011_3009_spec.rb
|
535
547
|
- spec/lib/kb/cve_2011_3187_spec.rb
|
536
548
|
- spec/lib/kb/cve_2011_4319_spec.rb
|
549
|
+
- spec/lib/kb/cve_2013_0256_spec.rb
|
550
|
+
- spec/lib/kb/cve_2013_0263_spec.rb
|
537
551
|
- spec/lib/kb/cve_2013_2090_spec.rb
|
552
|
+
- spec/lib/kb/cve_2013_2119_spec.rb
|
553
|
+
- spec/lib/kb/cve_2013_5647_spec.rb
|
554
|
+
- spec/lib/kb/cve_2013_6459_spec.rb
|
555
|
+
- spec/lib/kb/cve_2013_7086_spec.rb
|
538
556
|
- spec/lib/kb/owasp_ror_cheatsheet_disabled.rb
|
539
557
|
- spec/spec_helper.rb
|