codesake-dawn 1.0.0.rc2 → 1.0.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.gitignore +0 -1
- data/Changelog.md +36 -5
- data/KnowledgeBase.md +153 -0
- data/README.md +36 -13
- data/Rakefile +21 -3
- data/Roadmap.md +22 -22
- data/codesake-dawn.gemspec +3 -3
- data/doc/dawn_1_0_announcement.md +40 -0
- data/lib/codesake/dawn/kb/basic_check.rb +42 -2
- data/lib/codesake/dawn/kb/cve_2012_1098.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2012_2139.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2012_2671.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2012_6134.rb +1 -1
- data/lib/codesake/dawn/kb/cve_2013_0162.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_0263.rb +3 -4
- data/lib/codesake/dawn/kb/cve_2013_1756.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_4457.rb +1 -0
- data/lib/codesake/dawn/kb/dependency_check.rb +4 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet.rb +2 -0
- data/lib/codesake/dawn/kb/pattern_match_check.rb +17 -1
- data/lib/codesake/dawn/knowledge_base.rb +10 -0
- data/lib/codesake/dawn/version.rb +8 -5
- data/spec/lib/dawn/codesake_knowledgebase_spec.rb +25 -0
- data/spec/lib/kb/codesake_cve_2013_4457_spec.rb +1 -0
- data/spec/lib/kb/codesake_dependency_version_check_spec.rb +65 -0
- data/spec/lib/kb/cve_2011_2705_spec.rb +28 -1
- data/spec/lib/kb/cve_2011_2930_spec.rb +25 -1
- data/spec/lib/kb/cve_2011_3009_spec.rb +18 -1
- data/spec/lib/kb/cve_2011_3187_spec.rb +17 -1
- data/spec/lib/kb/cve_2011_4319_spec.rb +37 -1
- data/spec/lib/kb/cve_2012_1098_spec.rb +36 -0
- data/spec/lib/kb/cve_2012_2139_spec.rb +20 -0
- data/spec/lib/kb/cve_2012_2671_spec.rb +23 -0
- data/spec/lib/kb/cve_2013_0162_spec.rb +23 -0
- data/spec/lib/kb/cve_2013_0256_spec.rb +34 -1
- data/spec/lib/kb/cve_2013_0263_spec.rb +4 -1
- data/spec/lib/kb/cve_2013_1756_spec.rb +23 -0
- data/spec/lib/kb/cve_2013_2090_spec.rb +13 -1
- data/spec/lib/kb/cve_2013_2119_spec.rb +20 -1
- data/spec/lib/kb/cve_2013_5647_spec.rb +12 -1
- data/spec/lib/kb/cve_2013_6459_spec.rb +12 -5
- data/spec/lib/kb/cve_2013_7086_spec.rb +1 -1
- metadata +28 -95
- data/spec/lib/kb/cve_2004_0983_spec.rb +0 -8
- data/spec/lib/kb/cve_2005_1992_spec.rb +0 -8
- data/spec/lib/kb/cve_2005_2337_spec.rb +0 -8
- data/spec/lib/kb/cve_2006_1931_spec.rb +0 -8
- data/spec/lib/kb/cve_2006_2582_spec.rb +0 -8
- data/spec/lib/kb/cve_2006_3694_spec.rb +0 -8
- data/spec/lib/kb/cve_2006_4112_spec.rb +0 -8
- data/spec/lib/kb/cve_2006_5467_spec.rb +0 -8
- data/spec/lib/kb/cve_2006_6303_spec.rb +0 -8
- data/spec/lib/kb/cve_2006_6852_spec.rb +0 -8
- data/spec/lib/kb/cve_2006_6979_spec.rb +0 -8
- data/spec/lib/kb/cve_2007_0469_spec.rb +0 -8
- data/spec/lib/kb/cve_2007_5162_spec.rb +0 -8
- data/spec/lib/kb/cve_2007_5379_spec.rb +0 -8
- data/spec/lib/kb/cve_2007_5380_spec.rb +0 -8
- data/spec/lib/kb/cve_2007_5770_spec.rb +0 -8
- data/spec/lib/kb/cve_2007_6077_spec.rb +0 -8
- data/spec/lib/kb/cve_2007_6612_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_1145_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_1891_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_2376_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_2662_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_2663_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_2664_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_2725_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_3655_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_3657_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_3790_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_3905_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_4094_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_4310_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_5189_spec.rb +0 -8
- data/spec/lib/kb/cve_2008_7248_spec.rb +0 -8
- data/spec/lib/kb/cve_2009_4078_spec.rb +0 -8
- data/spec/lib/kb/cve_2009_4124_spec.rb +0 -8
- data/spec/lib/kb/cve_2009_4214_spec.rb +0 -8
- data/spec/lib/kb/cve_2010_2489_spec.rb +0 -8
- data/spec/lib/kb/cve_2010_3933_spec.rb +0 -8
- data/spec/lib/kb/cve_2011_0188_spec.rb +0 -8
- data/spec/lib/kb/cve_2011_0739_spec.rb +0 -8
- data/spec/lib/kb/cve_2011_1004_spec.rb +0 -8
- data/spec/lib/kb/cve_2011_1005_spec.rb +0 -8
- data/spec/lib/kb/cve_2011_2686_spec.rb +0 -8
@@ -0,0 +1,23 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2012-2671 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2012_2671.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "is reported when ruby-cache version 0.5 is used" do
|
8
|
+
@check.dependencies = [{:name=>"rack-cache", :version=>'0.5'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "is reported when ruby-cache version 0.8 is used" do
|
12
|
+
@check.dependencies = [{:name=>"rack-cache", :version=>'0.8'}]
|
13
|
+
@check.vuln?.should be_true
|
14
|
+
end
|
15
|
+
it "is reported when ruby-cache version 1.1.1 is used" do
|
16
|
+
@check.dependencies = [{:name=>"rack-cache", :version=>'1.1.1'}]
|
17
|
+
@check.vuln?.should be_true
|
18
|
+
end
|
19
|
+
it "is not reported when ruby-cache version 1.1.2 is used" do
|
20
|
+
@check.dependencies = [{:name=>"rack-cache", :version=>'1.1.2'}]
|
21
|
+
@check.vuln?.should be_false
|
22
|
+
end
|
23
|
+
end
|
@@ -0,0 +1,23 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-0162 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_0162.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "is reported when ruby_parser version 1.x is used" do
|
8
|
+
@check.dependencies = [{:name=>"ruby_parser", :version=>'1.4.5'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "is reported when ruby_parser version 2.x is used" do
|
12
|
+
@check.dependencies = [{:name=>"ruby_parser", :version=>'2.4.5'}]
|
13
|
+
@check.vuln?.should be_true
|
14
|
+
end
|
15
|
+
it "is reported when ruby_parser version 3.0.x is used" do
|
16
|
+
@check.dependencies = [{:name=>"ruby_parser", :version=>'3.0.5'}]
|
17
|
+
@check.vuln?.should be_true
|
18
|
+
end
|
19
|
+
it "is not reported when ruby_parser version 3.1.1 is used" do
|
20
|
+
@check.dependencies = [{:name=>"ruby_parser", :version=>'3.1.1'}]
|
21
|
+
@check.vuln?.should be_false
|
22
|
+
end
|
23
|
+
end
|
@@ -4,5 +4,38 @@ describe "The CVE-2013-0256 vulnerability" do
|
|
4
4
|
@check = Codesake::Dawn::Kb::CVE_2013_0256.new
|
5
5
|
# @check.debug = true
|
6
6
|
end
|
7
|
-
|
7
|
+
it "fires when vulnerable ruby (1.9.3-p382) and rdoc version (2.3.0) has been found" do
|
8
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"381"}, :dependencies=>[{:name=>"rdoc", :version=>'2.3.0'}, :root_dir=>"."]}
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "fires when vulnerable ruby (1.9.2-p342) and rdoc version (2.3.0) has been found" do
|
12
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.2", :patchlevel=>"342"}, :dependencies=>[{:name=>"rdoc", :version=>'2.3.0'}, :root_dir=>"."]}
|
13
|
+
@check.vuln?.should be_true
|
14
|
+
end
|
15
|
+
|
16
|
+
it "fires when vulnerable ruby (1.9.3-p382) and rdoc version (3.12) has been found" do
|
17
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"381"}, :dependencies=>[{:name=>"rdoc", :version=>'3.12'}, :root_dir=>"."]}
|
18
|
+
@check.vuln?.should be_true
|
19
|
+
end
|
20
|
+
it "fires when vulnerable ruby (1.9.2-p342) and rdoc version (3.12) has been found" do
|
21
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.2", :patchlevel=>"342"}, :dependencies=>[{:name=>"rdoc", :version=>'3.12'}, :root_dir=>"."]}
|
22
|
+
@check.vuln?.should be_true
|
23
|
+
end
|
24
|
+
|
25
|
+
it "doesn't fire when not vulnerable ruby (1.9.3-p383) is found but vulnerable rdoc version (3.12) has been found" do
|
26
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.2", :patchlevel=>"342"}, :dependencies=>[{:name=>"rdoc", :version=>'3.99'}, :root_dir=>"."]}
|
27
|
+
@check.vuln?.should be_false
|
28
|
+
end
|
29
|
+
|
30
|
+
it "doesn't fire when vulnerable ruby (1.9.3-p382) is found but not vulnerable rdoc version (3.13) has been found" do
|
31
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"322"}, :dependencies=>[{:name=>"rdoc", :version=>'3.13'}, :root_dir=>"."]}
|
32
|
+
@check.vuln?.should be_false
|
33
|
+
end
|
34
|
+
|
35
|
+
# self.safe_dependencies = [{:name=>"rdoc", :version=>['2.3.1', '3.13', '4.0.0']}]
|
36
|
+
|
37
|
+
# self.safe_rubies = [
|
38
|
+
# {:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"p383"},
|
39
|
+
# {:engine=>"ruby", :version=>"2.0.0", :patchlevel=>"p0"}
|
40
|
+
# ]
|
8
41
|
end
|
@@ -4,5 +4,8 @@ describe "The CVE-2013-0263 vulnerability" do
|
|
4
4
|
@check = Codesake::Dawn::Kb::CVE_2013_0263.new
|
5
5
|
# @check.debug = true
|
6
6
|
end
|
7
|
-
|
7
|
+
it "is not reported when rack version 1.4.5 is used" do
|
8
|
+
@check.dependencies = [{:name=>"rack", :version=>'1.4.5'}]
|
9
|
+
@check.vuln?.should be_false
|
10
|
+
end
|
8
11
|
end
|
@@ -0,0 +1,23 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-1756 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_1756.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "is reported when dragonfly version 0.9.12 is used" do
|
8
|
+
@check.dependencies = [{:name=>"dragonfly", :version=>'0.9.12'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "is reported when dragonfly version 0.8.12 is used" do
|
12
|
+
@check.dependencies = [{:name=>"dragonfly", :version=>'0.8.12'}]
|
13
|
+
@check.vuln?.should be_true
|
14
|
+
end
|
15
|
+
it "is reported when dragonfly version 0.7.12 is used" do
|
16
|
+
@check.dependencies = [{:name=>"dragonfly", :version=>'0.7.12'}]
|
17
|
+
@check.vuln?.should be_true
|
18
|
+
end
|
19
|
+
it "is not reported when dragonfly version 0.9.13 is used" do
|
20
|
+
@check.dependencies = [{:name=>"dragonfly", :version=>'0.9.13'}]
|
21
|
+
@check.vuln?.should be_false
|
22
|
+
end
|
23
|
+
end
|
@@ -4,5 +4,17 @@ describe "The CVE-2013-2090 vulnerability" do
|
|
4
4
|
@check = Codesake::Dawn::Kb::CVE_2013_2090.new
|
5
5
|
# @check.debug = true
|
6
6
|
end
|
7
|
-
|
7
|
+
it "fires when vulnerable cremefraiche version is used" do
|
8
|
+
@check.dependencies = [{:name=>"cremefraiche", :version=>'0.6.1'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "doesn't fire when not vulnerable cremefraiche version is used" do
|
12
|
+
@check.dependencies = [{:name=>"cremefraiche", :version=>'0.6.2'}]
|
13
|
+
@check.vuln?.should be_false
|
14
|
+
end
|
15
|
+
it "fires when 0.5 and previous versions are found. We must check that cremefraiche version 0.5.2 version is vulnerable"
|
16
|
+
# it "doesn't fire when an older not vulnerable cremefraiche version is used" do
|
17
|
+
# @check.dependencies = [{:name=>"cremefraiche", :version=>'0.5.2'}]
|
18
|
+
# @check.vuln?.should be_false
|
19
|
+
# end
|
8
20
|
end
|
@@ -4,5 +4,24 @@ describe "The CVE-2013-2119 vulnerability" do
|
|
4
4
|
@check = Codesake::Dawn::Kb::CVE_2013_2119.new
|
5
5
|
# @check.debug = true
|
6
6
|
end
|
7
|
-
|
7
|
+
it "fires when vulnerable passenger version is used" do
|
8
|
+
@check.dependencies = [{:name=>"passenger", :version=>"4.0.4"}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "fires when vulnerable passenger version is used" do
|
12
|
+
@check.dependencies = [{:name=>"passenger", :version=>"4.0.0"}]
|
13
|
+
@check.vuln?.should be_true
|
14
|
+
end
|
15
|
+
it "fires when vulnerable passenger version is used" do
|
16
|
+
@check.dependencies = [{:name=>"passenger", :version=>"3.0.20"}]
|
17
|
+
@check.vuln?.should be_true
|
18
|
+
end
|
19
|
+
it "doesn't fire when not vulnerable passenger version is used" do
|
20
|
+
@check.dependencies = [{:name=>"passenger", :version=>"4.0.5"}]
|
21
|
+
@check.vuln?.should be_false
|
22
|
+
end
|
23
|
+
it "doesn't fire when not vulnerable passenger version is used" do
|
24
|
+
@check.dependencies = [{:name=>"passenger", :version=>"3.0.21"}]
|
25
|
+
@check.vuln?.should be_false
|
26
|
+
end
|
8
27
|
end
|
@@ -4,5 +4,16 @@ describe "The CVE-2013-5647 vulnerability" do
|
|
4
4
|
@check = Codesake::Dawn::Kb::CVE_2013_5647.new
|
5
5
|
# @check.debug = true
|
6
6
|
end
|
7
|
-
|
7
|
+
it "fires when vulnerable sounder 1.0.1 version is userd" do
|
8
|
+
@check.dependencies = [{:name=>"sounder", :version=>'1.0.1'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "doesn't fire when sounder not vulnerable version is used" do
|
12
|
+
@check.dependencies = [{:name=>"sounder", :version=>'1.0.2'}]
|
13
|
+
@check.vuln?.should be_false
|
14
|
+
end
|
15
|
+
it "doesn't fire when a very old sounder version is used" do
|
16
|
+
@check.dependencies = [{:name=>"sounder", :version=>'0.9.2'}]
|
17
|
+
@check.vuln?.should be_false
|
18
|
+
end
|
8
19
|
end
|
@@ -1,8 +1,15 @@
|
|
1
1
|
require 'spec_helper'
|
2
2
|
describe "The CVE-2013-6459 vulnerability" do
|
3
|
-
|
4
|
-
|
5
|
-
|
6
|
-
|
7
|
-
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_6459.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "fires when will_paginage 3.0.4 vulnerable version is used" do
|
8
|
+
@check.dependencies = [{:name=>"will_paginate", :version=>'3.0.4'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "doesn't fires when will_paginage 3.0.5 safe version is used" do
|
12
|
+
@check.dependencies = [{:name=>"will_paginate", :version=>'3.0.5'}]
|
13
|
+
@check.vuln?.should be_false
|
14
|
+
end
|
8
15
|
end
|
@@ -2,7 +2,7 @@ require 'spec_helper'
|
|
2
2
|
describe "The CVE-2013-7086 vulnerability" do
|
3
3
|
before(:all) do
|
4
4
|
@check = Codesake::Dawn::Kb::CVE_2013_7086.new
|
5
|
-
@check.debug = true
|
5
|
+
# @check.debug = true
|
6
6
|
end
|
7
7
|
it "is detected for gem 1.0.5.3" do
|
8
8
|
@check.dependencies = [{:name=>"webbynode", :version=>'1.0.5.3'}]
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: codesake-dawn
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.0.0
|
4
|
+
version: 1.0.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Paolo Perego
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2014-01-
|
11
|
+
date: 2014-01-21 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: codesake-commons
|
@@ -16,14 +16,14 @@ dependencies:
|
|
16
16
|
requirements:
|
17
17
|
- - ~>
|
18
18
|
- !ruby/object:Gem::Version
|
19
|
-
version: 0.
|
19
|
+
version: 0.90.0
|
20
20
|
type: :runtime
|
21
21
|
prerelease: false
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
23
23
|
requirements:
|
24
24
|
- - ~>
|
25
25
|
- !ruby/object:Gem::Version
|
26
|
-
version: 0.
|
26
|
+
version: 0.90.0
|
27
27
|
- !ruby/object:Gem::Dependency
|
28
28
|
name: cvss
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|
@@ -208,8 +208,8 @@ dependencies:
|
|
208
208
|
version: '0'
|
209
209
|
description: dawn is a security static source code analyzer for web applications written
|
210
210
|
in ruby. It supports major MVC frameworks like sinatra, padrino and ruby on rails.
|
211
|
-
dawn output is a list of security vulnerabilities affecting your code
|
212
|
-
|
211
|
+
dawn output is a list of security vulnerabilities affecting your code. It provides
|
212
|
+
more than 140 security checks with their own mitigation suggestion.
|
213
213
|
email:
|
214
214
|
- thesp0nge@gmail.com
|
215
215
|
executables:
|
@@ -223,12 +223,14 @@ files:
|
|
223
223
|
- .travis.yml
|
224
224
|
- Changelog.md
|
225
225
|
- Gemfile
|
226
|
+
- KnowledgeBase.md
|
226
227
|
- LICENSE.txt
|
227
228
|
- README.md
|
228
229
|
- Rakefile
|
229
230
|
- Roadmap.md
|
230
231
|
- bin/dawn
|
231
232
|
- codesake-dawn.gemspec
|
233
|
+
- doc/dawn_1_0_announcement.md
|
232
234
|
- features/dawn_complains_about_an_incorrect_command_line.feature.disabled
|
233
235
|
- features/dawn_scan_a_secure_sinatra_app.feature.disabled
|
234
236
|
- features/dawn_scan_a_vulnerable_sinatra_app.feature.disabled
|
@@ -299,11 +301,14 @@ files:
|
|
299
301
|
- lib/codesake/dawn/kb/cve_2011_3187.rb
|
300
302
|
- lib/codesake/dawn/kb/cve_2011_4319.rb
|
301
303
|
- lib/codesake/dawn/kb/cve_2011_4815.rb
|
304
|
+
- lib/codesake/dawn/kb/cve_2012_1098.rb
|
302
305
|
- lib/codesake/dawn/kb/cve_2012_1099.rb
|
303
306
|
- lib/codesake/dawn/kb/cve_2012_1241.rb
|
307
|
+
- lib/codesake/dawn/kb/cve_2012_2139.rb
|
304
308
|
- lib/codesake/dawn/kb/cve_2012_2140.rb
|
305
309
|
- lib/codesake/dawn/kb/cve_2012_2660.rb
|
306
310
|
- lib/codesake/dawn/kb/cve_2012_2661.rb
|
311
|
+
- lib/codesake/dawn/kb/cve_2012_2671.rb
|
307
312
|
- lib/codesake/dawn/kb/cve_2012_2694.rb
|
308
313
|
- lib/codesake/dawn/kb/cve_2012_2695.rb
|
309
314
|
- lib/codesake/dawn/kb/cve_2012_3424.rb
|
@@ -322,6 +327,7 @@ files:
|
|
322
327
|
- lib/codesake/dawn/kb/cve_2012_6497.rb
|
323
328
|
- lib/codesake/dawn/kb/cve_2013_0155.rb
|
324
329
|
- lib/codesake/dawn/kb/cve_2013_0156.rb
|
330
|
+
- lib/codesake/dawn/kb/cve_2013_0162.rb
|
325
331
|
- lib/codesake/dawn/kb/cve_2013_0175.rb
|
326
332
|
- lib/codesake/dawn/kb/cve_2013_0233.rb
|
327
333
|
- lib/codesake/dawn/kb/cve_2013_0256.rb
|
@@ -334,6 +340,7 @@ files:
|
|
334
340
|
- lib/codesake/dawn/kb/cve_2013_0333.rb
|
335
341
|
- lib/codesake/dawn/kb/cve_2013_1655.rb
|
336
342
|
- lib/codesake/dawn/kb/cve_2013_1656.rb
|
343
|
+
- lib/codesake/dawn/kb/cve_2013_1756.rb
|
337
344
|
- lib/codesake/dawn/kb/cve_2013_1800.rb
|
338
345
|
- lib/codesake/dawn/kb/cve_2013_1801.rb
|
339
346
|
- lib/codesake/dawn/kb/cve_2013_1802.rb
|
@@ -401,57 +408,20 @@ files:
|
|
401
408
|
- spec/lib/kb/codesake_cve_2013_1655_spec.rb
|
402
409
|
- spec/lib/kb/codesake_cve_2013_4457_spec.rb
|
403
410
|
- spec/lib/kb/codesake_cve_2013_6416_spec.rb
|
411
|
+
- spec/lib/kb/codesake_dependency_version_check_spec.rb
|
404
412
|
- spec/lib/kb/codesake_ruby_version_check_spec.rb
|
405
|
-
- spec/lib/kb/cve_2004_0983_spec.rb
|
406
|
-
- spec/lib/kb/cve_2005_1992_spec.rb
|
407
|
-
- spec/lib/kb/cve_2005_2337_spec.rb
|
408
|
-
- spec/lib/kb/cve_2006_1931_spec.rb
|
409
|
-
- spec/lib/kb/cve_2006_2582_spec.rb
|
410
|
-
- spec/lib/kb/cve_2006_3694_spec.rb
|
411
|
-
- spec/lib/kb/cve_2006_4112_spec.rb
|
412
|
-
- spec/lib/kb/cve_2006_5467_spec.rb
|
413
|
-
- spec/lib/kb/cve_2006_6303_spec.rb
|
414
|
-
- spec/lib/kb/cve_2006_6852_spec.rb
|
415
|
-
- spec/lib/kb/cve_2006_6979_spec.rb
|
416
|
-
- spec/lib/kb/cve_2007_0469_spec.rb
|
417
|
-
- spec/lib/kb/cve_2007_5162_spec.rb
|
418
|
-
- spec/lib/kb/cve_2007_5379_spec.rb
|
419
|
-
- spec/lib/kb/cve_2007_5380_spec.rb
|
420
|
-
- spec/lib/kb/cve_2007_5770_spec.rb
|
421
|
-
- spec/lib/kb/cve_2007_6077_spec.rb
|
422
|
-
- spec/lib/kb/cve_2007_6612_spec.rb
|
423
|
-
- spec/lib/kb/cve_2008_1145_spec.rb
|
424
|
-
- spec/lib/kb/cve_2008_1891_spec.rb
|
425
|
-
- spec/lib/kb/cve_2008_2376_spec.rb
|
426
|
-
- spec/lib/kb/cve_2008_2662_spec.rb
|
427
|
-
- spec/lib/kb/cve_2008_2663_spec.rb
|
428
|
-
- spec/lib/kb/cve_2008_2664_spec.rb
|
429
|
-
- spec/lib/kb/cve_2008_2725_spec.rb
|
430
|
-
- spec/lib/kb/cve_2008_3655_spec.rb
|
431
|
-
- spec/lib/kb/cve_2008_3657_spec.rb
|
432
|
-
- spec/lib/kb/cve_2008_3790_spec.rb
|
433
|
-
- spec/lib/kb/cve_2008_3905_spec.rb
|
434
|
-
- spec/lib/kb/cve_2008_4094_spec.rb
|
435
|
-
- spec/lib/kb/cve_2008_4310_spec.rb
|
436
|
-
- spec/lib/kb/cve_2008_5189_spec.rb
|
437
|
-
- spec/lib/kb/cve_2008_7248_spec.rb
|
438
|
-
- spec/lib/kb/cve_2009_4078_spec.rb
|
439
|
-
- spec/lib/kb/cve_2009_4124_spec.rb
|
440
|
-
- spec/lib/kb/cve_2009_4214_spec.rb
|
441
|
-
- spec/lib/kb/cve_2010_2489_spec.rb
|
442
|
-
- spec/lib/kb/cve_2010_3933_spec.rb
|
443
|
-
- spec/lib/kb/cve_2011_0188_spec.rb
|
444
|
-
- spec/lib/kb/cve_2011_0739_spec.rb
|
445
|
-
- spec/lib/kb/cve_2011_1004_spec.rb
|
446
|
-
- spec/lib/kb/cve_2011_1005_spec.rb
|
447
|
-
- spec/lib/kb/cve_2011_2686_spec.rb
|
448
413
|
- spec/lib/kb/cve_2011_2705_spec.rb
|
449
414
|
- spec/lib/kb/cve_2011_2930_spec.rb
|
450
415
|
- spec/lib/kb/cve_2011_3009_spec.rb
|
451
416
|
- spec/lib/kb/cve_2011_3187_spec.rb
|
452
417
|
- spec/lib/kb/cve_2011_4319_spec.rb
|
418
|
+
- spec/lib/kb/cve_2012_1098_spec.rb
|
419
|
+
- spec/lib/kb/cve_2012_2139_spec.rb
|
420
|
+
- spec/lib/kb/cve_2012_2671_spec.rb
|
421
|
+
- spec/lib/kb/cve_2013_0162_spec.rb
|
453
422
|
- spec/lib/kb/cve_2013_0256_spec.rb
|
454
423
|
- spec/lib/kb/cve_2013_0263_spec.rb
|
424
|
+
- spec/lib/kb/cve_2013_1756_spec.rb
|
455
425
|
- spec/lib/kb/cve_2013_2090_spec.rb
|
456
426
|
- spec/lib/kb/cve_2013_2119_spec.rb
|
457
427
|
- spec/lib/kb/cve_2013_5647_spec.rb
|
@@ -473,16 +443,16 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
473
443
|
version: '0'
|
474
444
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
475
445
|
requirements:
|
476
|
-
- - '
|
446
|
+
- - '>='
|
477
447
|
- !ruby/object:Gem::Version
|
478
|
-
version:
|
448
|
+
version: '0'
|
479
449
|
requirements: []
|
480
450
|
rubyforge_project:
|
481
451
|
rubygems_version: 2.1.11
|
482
452
|
signing_key:
|
483
453
|
specification_version: 4
|
484
454
|
summary: dawn is a security static source code analyzer for sinatra, padrino and ruby
|
485
|
-
on rails web
|
455
|
+
on rails web applications.
|
486
456
|
test_files:
|
487
457
|
- features/dawn_complains_about_an_incorrect_command_line.feature.disabled
|
488
458
|
- features/dawn_scan_a_secure_sinatra_app.feature.disabled
|
@@ -497,57 +467,20 @@ test_files:
|
|
497
467
|
- spec/lib/kb/codesake_cve_2013_1655_spec.rb
|
498
468
|
- spec/lib/kb/codesake_cve_2013_4457_spec.rb
|
499
469
|
- spec/lib/kb/codesake_cve_2013_6416_spec.rb
|
470
|
+
- spec/lib/kb/codesake_dependency_version_check_spec.rb
|
500
471
|
- spec/lib/kb/codesake_ruby_version_check_spec.rb
|
501
|
-
- spec/lib/kb/cve_2004_0983_spec.rb
|
502
|
-
- spec/lib/kb/cve_2005_1992_spec.rb
|
503
|
-
- spec/lib/kb/cve_2005_2337_spec.rb
|
504
|
-
- spec/lib/kb/cve_2006_1931_spec.rb
|
505
|
-
- spec/lib/kb/cve_2006_2582_spec.rb
|
506
|
-
- spec/lib/kb/cve_2006_3694_spec.rb
|
507
|
-
- spec/lib/kb/cve_2006_4112_spec.rb
|
508
|
-
- spec/lib/kb/cve_2006_5467_spec.rb
|
509
|
-
- spec/lib/kb/cve_2006_6303_spec.rb
|
510
|
-
- spec/lib/kb/cve_2006_6852_spec.rb
|
511
|
-
- spec/lib/kb/cve_2006_6979_spec.rb
|
512
|
-
- spec/lib/kb/cve_2007_0469_spec.rb
|
513
|
-
- spec/lib/kb/cve_2007_5162_spec.rb
|
514
|
-
- spec/lib/kb/cve_2007_5379_spec.rb
|
515
|
-
- spec/lib/kb/cve_2007_5380_spec.rb
|
516
|
-
- spec/lib/kb/cve_2007_5770_spec.rb
|
517
|
-
- spec/lib/kb/cve_2007_6077_spec.rb
|
518
|
-
- spec/lib/kb/cve_2007_6612_spec.rb
|
519
|
-
- spec/lib/kb/cve_2008_1145_spec.rb
|
520
|
-
- spec/lib/kb/cve_2008_1891_spec.rb
|
521
|
-
- spec/lib/kb/cve_2008_2376_spec.rb
|
522
|
-
- spec/lib/kb/cve_2008_2662_spec.rb
|
523
|
-
- spec/lib/kb/cve_2008_2663_spec.rb
|
524
|
-
- spec/lib/kb/cve_2008_2664_spec.rb
|
525
|
-
- spec/lib/kb/cve_2008_2725_spec.rb
|
526
|
-
- spec/lib/kb/cve_2008_3655_spec.rb
|
527
|
-
- spec/lib/kb/cve_2008_3657_spec.rb
|
528
|
-
- spec/lib/kb/cve_2008_3790_spec.rb
|
529
|
-
- spec/lib/kb/cve_2008_3905_spec.rb
|
530
|
-
- spec/lib/kb/cve_2008_4094_spec.rb
|
531
|
-
- spec/lib/kb/cve_2008_4310_spec.rb
|
532
|
-
- spec/lib/kb/cve_2008_5189_spec.rb
|
533
|
-
- spec/lib/kb/cve_2008_7248_spec.rb
|
534
|
-
- spec/lib/kb/cve_2009_4078_spec.rb
|
535
|
-
- spec/lib/kb/cve_2009_4124_spec.rb
|
536
|
-
- spec/lib/kb/cve_2009_4214_spec.rb
|
537
|
-
- spec/lib/kb/cve_2010_2489_spec.rb
|
538
|
-
- spec/lib/kb/cve_2010_3933_spec.rb
|
539
|
-
- spec/lib/kb/cve_2011_0188_spec.rb
|
540
|
-
- spec/lib/kb/cve_2011_0739_spec.rb
|
541
|
-
- spec/lib/kb/cve_2011_1004_spec.rb
|
542
|
-
- spec/lib/kb/cve_2011_1005_spec.rb
|
543
|
-
- spec/lib/kb/cve_2011_2686_spec.rb
|
544
472
|
- spec/lib/kb/cve_2011_2705_spec.rb
|
545
473
|
- spec/lib/kb/cve_2011_2930_spec.rb
|
546
474
|
- spec/lib/kb/cve_2011_3009_spec.rb
|
547
475
|
- spec/lib/kb/cve_2011_3187_spec.rb
|
548
476
|
- spec/lib/kb/cve_2011_4319_spec.rb
|
477
|
+
- spec/lib/kb/cve_2012_1098_spec.rb
|
478
|
+
- spec/lib/kb/cve_2012_2139_spec.rb
|
479
|
+
- spec/lib/kb/cve_2012_2671_spec.rb
|
480
|
+
- spec/lib/kb/cve_2013_0162_spec.rb
|
549
481
|
- spec/lib/kb/cve_2013_0256_spec.rb
|
550
482
|
- spec/lib/kb/cve_2013_0263_spec.rb
|
483
|
+
- spec/lib/kb/cve_2013_1756_spec.rb
|
551
484
|
- spec/lib/kb/cve_2013_2090_spec.rb
|
552
485
|
- spec/lib/kb/cve_2013_2119_spec.rb
|
553
486
|
- spec/lib/kb/cve_2013_5647_spec.rb
|