codesake-dawn 1.0.0.rc2 → 1.0.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (87) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +0 -1
  3. data/Changelog.md +36 -5
  4. data/KnowledgeBase.md +153 -0
  5. data/README.md +36 -13
  6. data/Rakefile +21 -3
  7. data/Roadmap.md +22 -22
  8. data/codesake-dawn.gemspec +3 -3
  9. data/doc/dawn_1_0_announcement.md +40 -0
  10. data/lib/codesake/dawn/kb/basic_check.rb +42 -2
  11. data/lib/codesake/dawn/kb/cve_2012_1098.rb +31 -0
  12. data/lib/codesake/dawn/kb/cve_2012_2139.rb +28 -0
  13. data/lib/codesake/dawn/kb/cve_2012_2671.rb +30 -0
  14. data/lib/codesake/dawn/kb/cve_2012_6134.rb +1 -1
  15. data/lib/codesake/dawn/kb/cve_2013_0162.rb +30 -0
  16. data/lib/codesake/dawn/kb/cve_2013_0263.rb +3 -4
  17. data/lib/codesake/dawn/kb/cve_2013_1756.rb +28 -0
  18. data/lib/codesake/dawn/kb/cve_2013_4457.rb +1 -0
  19. data/lib/codesake/dawn/kb/dependency_check.rb +4 -0
  20. data/lib/codesake/dawn/kb/owasp_ror_cheatsheet.rb +2 -0
  21. data/lib/codesake/dawn/kb/pattern_match_check.rb +17 -1
  22. data/lib/codesake/dawn/knowledge_base.rb +10 -0
  23. data/lib/codesake/dawn/version.rb +8 -5
  24. data/spec/lib/dawn/codesake_knowledgebase_spec.rb +25 -0
  25. data/spec/lib/kb/codesake_cve_2013_4457_spec.rb +1 -0
  26. data/spec/lib/kb/codesake_dependency_version_check_spec.rb +65 -0
  27. data/spec/lib/kb/cve_2011_2705_spec.rb +28 -1
  28. data/spec/lib/kb/cve_2011_2930_spec.rb +25 -1
  29. data/spec/lib/kb/cve_2011_3009_spec.rb +18 -1
  30. data/spec/lib/kb/cve_2011_3187_spec.rb +17 -1
  31. data/spec/lib/kb/cve_2011_4319_spec.rb +37 -1
  32. data/spec/lib/kb/cve_2012_1098_spec.rb +36 -0
  33. data/spec/lib/kb/cve_2012_2139_spec.rb +20 -0
  34. data/spec/lib/kb/cve_2012_2671_spec.rb +23 -0
  35. data/spec/lib/kb/cve_2013_0162_spec.rb +23 -0
  36. data/spec/lib/kb/cve_2013_0256_spec.rb +34 -1
  37. data/spec/lib/kb/cve_2013_0263_spec.rb +4 -1
  38. data/spec/lib/kb/cve_2013_1756_spec.rb +23 -0
  39. data/spec/lib/kb/cve_2013_2090_spec.rb +13 -1
  40. data/spec/lib/kb/cve_2013_2119_spec.rb +20 -1
  41. data/spec/lib/kb/cve_2013_5647_spec.rb +12 -1
  42. data/spec/lib/kb/cve_2013_6459_spec.rb +12 -5
  43. data/spec/lib/kb/cve_2013_7086_spec.rb +1 -1
  44. metadata +28 -95
  45. data/spec/lib/kb/cve_2004_0983_spec.rb +0 -8
  46. data/spec/lib/kb/cve_2005_1992_spec.rb +0 -8
  47. data/spec/lib/kb/cve_2005_2337_spec.rb +0 -8
  48. data/spec/lib/kb/cve_2006_1931_spec.rb +0 -8
  49. data/spec/lib/kb/cve_2006_2582_spec.rb +0 -8
  50. data/spec/lib/kb/cve_2006_3694_spec.rb +0 -8
  51. data/spec/lib/kb/cve_2006_4112_spec.rb +0 -8
  52. data/spec/lib/kb/cve_2006_5467_spec.rb +0 -8
  53. data/spec/lib/kb/cve_2006_6303_spec.rb +0 -8
  54. data/spec/lib/kb/cve_2006_6852_spec.rb +0 -8
  55. data/spec/lib/kb/cve_2006_6979_spec.rb +0 -8
  56. data/spec/lib/kb/cve_2007_0469_spec.rb +0 -8
  57. data/spec/lib/kb/cve_2007_5162_spec.rb +0 -8
  58. data/spec/lib/kb/cve_2007_5379_spec.rb +0 -8
  59. data/spec/lib/kb/cve_2007_5380_spec.rb +0 -8
  60. data/spec/lib/kb/cve_2007_5770_spec.rb +0 -8
  61. data/spec/lib/kb/cve_2007_6077_spec.rb +0 -8
  62. data/spec/lib/kb/cve_2007_6612_spec.rb +0 -8
  63. data/spec/lib/kb/cve_2008_1145_spec.rb +0 -8
  64. data/spec/lib/kb/cve_2008_1891_spec.rb +0 -8
  65. data/spec/lib/kb/cve_2008_2376_spec.rb +0 -8
  66. data/spec/lib/kb/cve_2008_2662_spec.rb +0 -8
  67. data/spec/lib/kb/cve_2008_2663_spec.rb +0 -8
  68. data/spec/lib/kb/cve_2008_2664_spec.rb +0 -8
  69. data/spec/lib/kb/cve_2008_2725_spec.rb +0 -8
  70. data/spec/lib/kb/cve_2008_3655_spec.rb +0 -8
  71. data/spec/lib/kb/cve_2008_3657_spec.rb +0 -8
  72. data/spec/lib/kb/cve_2008_3790_spec.rb +0 -8
  73. data/spec/lib/kb/cve_2008_3905_spec.rb +0 -8
  74. data/spec/lib/kb/cve_2008_4094_spec.rb +0 -8
  75. data/spec/lib/kb/cve_2008_4310_spec.rb +0 -8
  76. data/spec/lib/kb/cve_2008_5189_spec.rb +0 -8
  77. data/spec/lib/kb/cve_2008_7248_spec.rb +0 -8
  78. data/spec/lib/kb/cve_2009_4078_spec.rb +0 -8
  79. data/spec/lib/kb/cve_2009_4124_spec.rb +0 -8
  80. data/spec/lib/kb/cve_2009_4214_spec.rb +0 -8
  81. data/spec/lib/kb/cve_2010_2489_spec.rb +0 -8
  82. data/spec/lib/kb/cve_2010_3933_spec.rb +0 -8
  83. data/spec/lib/kb/cve_2011_0188_spec.rb +0 -8
  84. data/spec/lib/kb/cve_2011_0739_spec.rb +0 -8
  85. data/spec/lib/kb/cve_2011_1004_spec.rb +0 -8
  86. data/spec/lib/kb/cve_2011_1005_spec.rb +0 -8
  87. data/spec/lib/kb/cve_2011_2686_spec.rb +0 -8
@@ -0,0 +1,23 @@
1
+ require 'spec_helper'
2
+ describe "The CVE-2012-2671 vulnerability" do
3
+ before(:all) do
4
+ @check = Codesake::Dawn::Kb::CVE_2012_2671.new
5
+ # @check.debug = true
6
+ end
7
+ it "is reported when ruby-cache version 0.5 is used" do
8
+ @check.dependencies = [{:name=>"rack-cache", :version=>'0.5'}]
9
+ @check.vuln?.should be_true
10
+ end
11
+ it "is reported when ruby-cache version 0.8 is used" do
12
+ @check.dependencies = [{:name=>"rack-cache", :version=>'0.8'}]
13
+ @check.vuln?.should be_true
14
+ end
15
+ it "is reported when ruby-cache version 1.1.1 is used" do
16
+ @check.dependencies = [{:name=>"rack-cache", :version=>'1.1.1'}]
17
+ @check.vuln?.should be_true
18
+ end
19
+ it "is not reported when ruby-cache version 1.1.2 is used" do
20
+ @check.dependencies = [{:name=>"rack-cache", :version=>'1.1.2'}]
21
+ @check.vuln?.should be_false
22
+ end
23
+ end
@@ -0,0 +1,23 @@
1
+ require 'spec_helper'
2
+ describe "The CVE-2013-0162 vulnerability" do
3
+ before(:all) do
4
+ @check = Codesake::Dawn::Kb::CVE_2013_0162.new
5
+ # @check.debug = true
6
+ end
7
+ it "is reported when ruby_parser version 1.x is used" do
8
+ @check.dependencies = [{:name=>"ruby_parser", :version=>'1.4.5'}]
9
+ @check.vuln?.should be_true
10
+ end
11
+ it "is reported when ruby_parser version 2.x is used" do
12
+ @check.dependencies = [{:name=>"ruby_parser", :version=>'2.4.5'}]
13
+ @check.vuln?.should be_true
14
+ end
15
+ it "is reported when ruby_parser version 3.0.x is used" do
16
+ @check.dependencies = [{:name=>"ruby_parser", :version=>'3.0.5'}]
17
+ @check.vuln?.should be_true
18
+ end
19
+ it "is not reported when ruby_parser version 3.1.1 is used" do
20
+ @check.dependencies = [{:name=>"ruby_parser", :version=>'3.1.1'}]
21
+ @check.vuln?.should be_false
22
+ end
23
+ end
@@ -4,5 +4,38 @@ describe "The CVE-2013-0256 vulnerability" do
4
4
  @check = Codesake::Dawn::Kb::CVE_2013_0256.new
5
5
  # @check.debug = true
6
6
  end
7
- it "needs some test..."
7
+ it "fires when vulnerable ruby (1.9.3-p382) and rdoc version (2.3.0) has been found" do
8
+ @check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"381"}, :dependencies=>[{:name=>"rdoc", :version=>'2.3.0'}, :root_dir=>"."]}
9
+ @check.vuln?.should be_true
10
+ end
11
+ it "fires when vulnerable ruby (1.9.2-p342) and rdoc version (2.3.0) has been found" do
12
+ @check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.2", :patchlevel=>"342"}, :dependencies=>[{:name=>"rdoc", :version=>'2.3.0'}, :root_dir=>"."]}
13
+ @check.vuln?.should be_true
14
+ end
15
+
16
+ it "fires when vulnerable ruby (1.9.3-p382) and rdoc version (3.12) has been found" do
17
+ @check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"381"}, :dependencies=>[{:name=>"rdoc", :version=>'3.12'}, :root_dir=>"."]}
18
+ @check.vuln?.should be_true
19
+ end
20
+ it "fires when vulnerable ruby (1.9.2-p342) and rdoc version (3.12) has been found" do
21
+ @check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.2", :patchlevel=>"342"}, :dependencies=>[{:name=>"rdoc", :version=>'3.12'}, :root_dir=>"."]}
22
+ @check.vuln?.should be_true
23
+ end
24
+
25
+ it "doesn't fire when not vulnerable ruby (1.9.3-p383) is found but vulnerable rdoc version (3.12) has been found" do
26
+ @check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.2", :patchlevel=>"342"}, :dependencies=>[{:name=>"rdoc", :version=>'3.99'}, :root_dir=>"."]}
27
+ @check.vuln?.should be_false
28
+ end
29
+
30
+ it "doesn't fire when vulnerable ruby (1.9.3-p382) is found but not vulnerable rdoc version (3.13) has been found" do
31
+ @check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"322"}, :dependencies=>[{:name=>"rdoc", :version=>'3.13'}, :root_dir=>"."]}
32
+ @check.vuln?.should be_false
33
+ end
34
+
35
+ # self.safe_dependencies = [{:name=>"rdoc", :version=>['2.3.1', '3.13', '4.0.0']}]
36
+
37
+ # self.safe_rubies = [
38
+ # {:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"p383"},
39
+ # {:engine=>"ruby", :version=>"2.0.0", :patchlevel=>"p0"}
40
+ # ]
8
41
  end
@@ -4,5 +4,8 @@ describe "The CVE-2013-0263 vulnerability" do
4
4
  @check = Codesake::Dawn::Kb::CVE_2013_0263.new
5
5
  # @check.debug = true
6
6
  end
7
- it "needs some test..."
7
+ it "is not reported when rack version 1.4.5 is used" do
8
+ @check.dependencies = [{:name=>"rack", :version=>'1.4.5'}]
9
+ @check.vuln?.should be_false
10
+ end
8
11
  end
@@ -0,0 +1,23 @@
1
+ require 'spec_helper'
2
+ describe "The CVE-2013-1756 vulnerability" do
3
+ before(:all) do
4
+ @check = Codesake::Dawn::Kb::CVE_2013_1756.new
5
+ # @check.debug = true
6
+ end
7
+ it "is reported when dragonfly version 0.9.12 is used" do
8
+ @check.dependencies = [{:name=>"dragonfly", :version=>'0.9.12'}]
9
+ @check.vuln?.should be_true
10
+ end
11
+ it "is reported when dragonfly version 0.8.12 is used" do
12
+ @check.dependencies = [{:name=>"dragonfly", :version=>'0.8.12'}]
13
+ @check.vuln?.should be_true
14
+ end
15
+ it "is reported when dragonfly version 0.7.12 is used" do
16
+ @check.dependencies = [{:name=>"dragonfly", :version=>'0.7.12'}]
17
+ @check.vuln?.should be_true
18
+ end
19
+ it "is not reported when dragonfly version 0.9.13 is used" do
20
+ @check.dependencies = [{:name=>"dragonfly", :version=>'0.9.13'}]
21
+ @check.vuln?.should be_false
22
+ end
23
+ end
@@ -4,5 +4,17 @@ describe "The CVE-2013-2090 vulnerability" do
4
4
  @check = Codesake::Dawn::Kb::CVE_2013_2090.new
5
5
  # @check.debug = true
6
6
  end
7
- it "needs some test..."
7
+ it "fires when vulnerable cremefraiche version is used" do
8
+ @check.dependencies = [{:name=>"cremefraiche", :version=>'0.6.1'}]
9
+ @check.vuln?.should be_true
10
+ end
11
+ it "doesn't fire when not vulnerable cremefraiche version is used" do
12
+ @check.dependencies = [{:name=>"cremefraiche", :version=>'0.6.2'}]
13
+ @check.vuln?.should be_false
14
+ end
15
+ it "fires when 0.5 and previous versions are found. We must check that cremefraiche version 0.5.2 version is vulnerable"
16
+ # it "doesn't fire when an older not vulnerable cremefraiche version is used" do
17
+ # @check.dependencies = [{:name=>"cremefraiche", :version=>'0.5.2'}]
18
+ # @check.vuln?.should be_false
19
+ # end
8
20
  end
@@ -4,5 +4,24 @@ describe "The CVE-2013-2119 vulnerability" do
4
4
  @check = Codesake::Dawn::Kb::CVE_2013_2119.new
5
5
  # @check.debug = true
6
6
  end
7
- it "needs some test..."
7
+ it "fires when vulnerable passenger version is used" do
8
+ @check.dependencies = [{:name=>"passenger", :version=>"4.0.4"}]
9
+ @check.vuln?.should be_true
10
+ end
11
+ it "fires when vulnerable passenger version is used" do
12
+ @check.dependencies = [{:name=>"passenger", :version=>"4.0.0"}]
13
+ @check.vuln?.should be_true
14
+ end
15
+ it "fires when vulnerable passenger version is used" do
16
+ @check.dependencies = [{:name=>"passenger", :version=>"3.0.20"}]
17
+ @check.vuln?.should be_true
18
+ end
19
+ it "doesn't fire when not vulnerable passenger version is used" do
20
+ @check.dependencies = [{:name=>"passenger", :version=>"4.0.5"}]
21
+ @check.vuln?.should be_false
22
+ end
23
+ it "doesn't fire when not vulnerable passenger version is used" do
24
+ @check.dependencies = [{:name=>"passenger", :version=>"3.0.21"}]
25
+ @check.vuln?.should be_false
26
+ end
8
27
  end
@@ -4,5 +4,16 @@ describe "The CVE-2013-5647 vulnerability" do
4
4
  @check = Codesake::Dawn::Kb::CVE_2013_5647.new
5
5
  # @check.debug = true
6
6
  end
7
- it "needs some test..."
7
+ it "fires when vulnerable sounder 1.0.1 version is userd" do
8
+ @check.dependencies = [{:name=>"sounder", :version=>'1.0.1'}]
9
+ @check.vuln?.should be_true
10
+ end
11
+ it "doesn't fire when sounder not vulnerable version is used" do
12
+ @check.dependencies = [{:name=>"sounder", :version=>'1.0.2'}]
13
+ @check.vuln?.should be_false
14
+ end
15
+ it "doesn't fire when a very old sounder version is used" do
16
+ @check.dependencies = [{:name=>"sounder", :version=>'0.9.2'}]
17
+ @check.vuln?.should be_false
18
+ end
8
19
  end
@@ -1,8 +1,15 @@
1
1
  require 'spec_helper'
2
2
  describe "The CVE-2013-6459 vulnerability" do
3
- before(:all) do
4
- @check = Codesake::Dawn::Kb::CVE_2013_6459.new
5
- # @check.debug = true
6
- end
7
- it "needs some test..."
3
+ before(:all) do
4
+ @check = Codesake::Dawn::Kb::CVE_2013_6459.new
5
+ # @check.debug = true
6
+ end
7
+ it "fires when will_paginage 3.0.4 vulnerable version is used" do
8
+ @check.dependencies = [{:name=>"will_paginate", :version=>'3.0.4'}]
9
+ @check.vuln?.should be_true
10
+ end
11
+ it "doesn't fires when will_paginage 3.0.5 safe version is used" do
12
+ @check.dependencies = [{:name=>"will_paginate", :version=>'3.0.5'}]
13
+ @check.vuln?.should be_false
14
+ end
8
15
  end
@@ -2,7 +2,7 @@ require 'spec_helper'
2
2
  describe "The CVE-2013-7086 vulnerability" do
3
3
  before(:all) do
4
4
  @check = Codesake::Dawn::Kb::CVE_2013_7086.new
5
- @check.debug = true
5
+ # @check.debug = true
6
6
  end
7
7
  it "is detected for gem 1.0.5.3" do
8
8
  @check.dependencies = [{:name=>"webbynode", :version=>'1.0.5.3'}]
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: codesake-dawn
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.0.rc2
4
+ version: 1.0.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Paolo Perego
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2014-01-14 00:00:00.000000000 Z
11
+ date: 2014-01-21 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: codesake-commons
@@ -16,14 +16,14 @@ dependencies:
16
16
  requirements:
17
17
  - - ~>
18
18
  - !ruby/object:Gem::Version
19
- version: 0.89.0
19
+ version: 0.90.0
20
20
  type: :runtime
21
21
  prerelease: false
22
22
  version_requirements: !ruby/object:Gem::Requirement
23
23
  requirements:
24
24
  - - ~>
25
25
  - !ruby/object:Gem::Version
26
- version: 0.89.0
26
+ version: 0.90.0
27
27
  - !ruby/object:Gem::Dependency
28
28
  name: cvss
29
29
  requirement: !ruby/object:Gem::Requirement
@@ -208,8 +208,8 @@ dependencies:
208
208
  version: '0'
209
209
  description: dawn is a security static source code analyzer for web applications written
210
210
  in ruby. It supports major MVC frameworks like sinatra, padrino and ruby on rails.
211
- dawn output is a list of security vulnerabilities affecting your code with a suggestion
212
- on how to mitigate all of them.
211
+ dawn output is a list of security vulnerabilities affecting your code. It provides
212
+ more than 140 security checks with their own mitigation suggestion.
213
213
  email:
214
214
  - thesp0nge@gmail.com
215
215
  executables:
@@ -223,12 +223,14 @@ files:
223
223
  - .travis.yml
224
224
  - Changelog.md
225
225
  - Gemfile
226
+ - KnowledgeBase.md
226
227
  - LICENSE.txt
227
228
  - README.md
228
229
  - Rakefile
229
230
  - Roadmap.md
230
231
  - bin/dawn
231
232
  - codesake-dawn.gemspec
233
+ - doc/dawn_1_0_announcement.md
232
234
  - features/dawn_complains_about_an_incorrect_command_line.feature.disabled
233
235
  - features/dawn_scan_a_secure_sinatra_app.feature.disabled
234
236
  - features/dawn_scan_a_vulnerable_sinatra_app.feature.disabled
@@ -299,11 +301,14 @@ files:
299
301
  - lib/codesake/dawn/kb/cve_2011_3187.rb
300
302
  - lib/codesake/dawn/kb/cve_2011_4319.rb
301
303
  - lib/codesake/dawn/kb/cve_2011_4815.rb
304
+ - lib/codesake/dawn/kb/cve_2012_1098.rb
302
305
  - lib/codesake/dawn/kb/cve_2012_1099.rb
303
306
  - lib/codesake/dawn/kb/cve_2012_1241.rb
307
+ - lib/codesake/dawn/kb/cve_2012_2139.rb
304
308
  - lib/codesake/dawn/kb/cve_2012_2140.rb
305
309
  - lib/codesake/dawn/kb/cve_2012_2660.rb
306
310
  - lib/codesake/dawn/kb/cve_2012_2661.rb
311
+ - lib/codesake/dawn/kb/cve_2012_2671.rb
307
312
  - lib/codesake/dawn/kb/cve_2012_2694.rb
308
313
  - lib/codesake/dawn/kb/cve_2012_2695.rb
309
314
  - lib/codesake/dawn/kb/cve_2012_3424.rb
@@ -322,6 +327,7 @@ files:
322
327
  - lib/codesake/dawn/kb/cve_2012_6497.rb
323
328
  - lib/codesake/dawn/kb/cve_2013_0155.rb
324
329
  - lib/codesake/dawn/kb/cve_2013_0156.rb
330
+ - lib/codesake/dawn/kb/cve_2013_0162.rb
325
331
  - lib/codesake/dawn/kb/cve_2013_0175.rb
326
332
  - lib/codesake/dawn/kb/cve_2013_0233.rb
327
333
  - lib/codesake/dawn/kb/cve_2013_0256.rb
@@ -334,6 +340,7 @@ files:
334
340
  - lib/codesake/dawn/kb/cve_2013_0333.rb
335
341
  - lib/codesake/dawn/kb/cve_2013_1655.rb
336
342
  - lib/codesake/dawn/kb/cve_2013_1656.rb
343
+ - lib/codesake/dawn/kb/cve_2013_1756.rb
337
344
  - lib/codesake/dawn/kb/cve_2013_1800.rb
338
345
  - lib/codesake/dawn/kb/cve_2013_1801.rb
339
346
  - lib/codesake/dawn/kb/cve_2013_1802.rb
@@ -401,57 +408,20 @@ files:
401
408
  - spec/lib/kb/codesake_cve_2013_1655_spec.rb
402
409
  - spec/lib/kb/codesake_cve_2013_4457_spec.rb
403
410
  - spec/lib/kb/codesake_cve_2013_6416_spec.rb
411
+ - spec/lib/kb/codesake_dependency_version_check_spec.rb
404
412
  - spec/lib/kb/codesake_ruby_version_check_spec.rb
405
- - spec/lib/kb/cve_2004_0983_spec.rb
406
- - spec/lib/kb/cve_2005_1992_spec.rb
407
- - spec/lib/kb/cve_2005_2337_spec.rb
408
- - spec/lib/kb/cve_2006_1931_spec.rb
409
- - spec/lib/kb/cve_2006_2582_spec.rb
410
- - spec/lib/kb/cve_2006_3694_spec.rb
411
- - spec/lib/kb/cve_2006_4112_spec.rb
412
- - spec/lib/kb/cve_2006_5467_spec.rb
413
- - spec/lib/kb/cve_2006_6303_spec.rb
414
- - spec/lib/kb/cve_2006_6852_spec.rb
415
- - spec/lib/kb/cve_2006_6979_spec.rb
416
- - spec/lib/kb/cve_2007_0469_spec.rb
417
- - spec/lib/kb/cve_2007_5162_spec.rb
418
- - spec/lib/kb/cve_2007_5379_spec.rb
419
- - spec/lib/kb/cve_2007_5380_spec.rb
420
- - spec/lib/kb/cve_2007_5770_spec.rb
421
- - spec/lib/kb/cve_2007_6077_spec.rb
422
- - spec/lib/kb/cve_2007_6612_spec.rb
423
- - spec/lib/kb/cve_2008_1145_spec.rb
424
- - spec/lib/kb/cve_2008_1891_spec.rb
425
- - spec/lib/kb/cve_2008_2376_spec.rb
426
- - spec/lib/kb/cve_2008_2662_spec.rb
427
- - spec/lib/kb/cve_2008_2663_spec.rb
428
- - spec/lib/kb/cve_2008_2664_spec.rb
429
- - spec/lib/kb/cve_2008_2725_spec.rb
430
- - spec/lib/kb/cve_2008_3655_spec.rb
431
- - spec/lib/kb/cve_2008_3657_spec.rb
432
- - spec/lib/kb/cve_2008_3790_spec.rb
433
- - spec/lib/kb/cve_2008_3905_spec.rb
434
- - spec/lib/kb/cve_2008_4094_spec.rb
435
- - spec/lib/kb/cve_2008_4310_spec.rb
436
- - spec/lib/kb/cve_2008_5189_spec.rb
437
- - spec/lib/kb/cve_2008_7248_spec.rb
438
- - spec/lib/kb/cve_2009_4078_spec.rb
439
- - spec/lib/kb/cve_2009_4124_spec.rb
440
- - spec/lib/kb/cve_2009_4214_spec.rb
441
- - spec/lib/kb/cve_2010_2489_spec.rb
442
- - spec/lib/kb/cve_2010_3933_spec.rb
443
- - spec/lib/kb/cve_2011_0188_spec.rb
444
- - spec/lib/kb/cve_2011_0739_spec.rb
445
- - spec/lib/kb/cve_2011_1004_spec.rb
446
- - spec/lib/kb/cve_2011_1005_spec.rb
447
- - spec/lib/kb/cve_2011_2686_spec.rb
448
413
  - spec/lib/kb/cve_2011_2705_spec.rb
449
414
  - spec/lib/kb/cve_2011_2930_spec.rb
450
415
  - spec/lib/kb/cve_2011_3009_spec.rb
451
416
  - spec/lib/kb/cve_2011_3187_spec.rb
452
417
  - spec/lib/kb/cve_2011_4319_spec.rb
418
+ - spec/lib/kb/cve_2012_1098_spec.rb
419
+ - spec/lib/kb/cve_2012_2139_spec.rb
420
+ - spec/lib/kb/cve_2012_2671_spec.rb
421
+ - spec/lib/kb/cve_2013_0162_spec.rb
453
422
  - spec/lib/kb/cve_2013_0256_spec.rb
454
423
  - spec/lib/kb/cve_2013_0263_spec.rb
424
+ - spec/lib/kb/cve_2013_1756_spec.rb
455
425
  - spec/lib/kb/cve_2013_2090_spec.rb
456
426
  - spec/lib/kb/cve_2013_2119_spec.rb
457
427
  - spec/lib/kb/cve_2013_5647_spec.rb
@@ -473,16 +443,16 @@ required_ruby_version: !ruby/object:Gem::Requirement
473
443
  version: '0'
474
444
  required_rubygems_version: !ruby/object:Gem::Requirement
475
445
  requirements:
476
- - - '>'
446
+ - - '>='
477
447
  - !ruby/object:Gem::Version
478
- version: 1.3.1
448
+ version: '0'
479
449
  requirements: []
480
450
  rubyforge_project:
481
451
  rubygems_version: 2.1.11
482
452
  signing_key:
483
453
  specification_version: 4
484
454
  summary: dawn is a security static source code analyzer for sinatra, padrino and ruby
485
- on rails web applicartions.
455
+ on rails web applications.
486
456
  test_files:
487
457
  - features/dawn_complains_about_an_incorrect_command_line.feature.disabled
488
458
  - features/dawn_scan_a_secure_sinatra_app.feature.disabled
@@ -497,57 +467,20 @@ test_files:
497
467
  - spec/lib/kb/codesake_cve_2013_1655_spec.rb
498
468
  - spec/lib/kb/codesake_cve_2013_4457_spec.rb
499
469
  - spec/lib/kb/codesake_cve_2013_6416_spec.rb
470
+ - spec/lib/kb/codesake_dependency_version_check_spec.rb
500
471
  - spec/lib/kb/codesake_ruby_version_check_spec.rb
501
- - spec/lib/kb/cve_2004_0983_spec.rb
502
- - spec/lib/kb/cve_2005_1992_spec.rb
503
- - spec/lib/kb/cve_2005_2337_spec.rb
504
- - spec/lib/kb/cve_2006_1931_spec.rb
505
- - spec/lib/kb/cve_2006_2582_spec.rb
506
- - spec/lib/kb/cve_2006_3694_spec.rb
507
- - spec/lib/kb/cve_2006_4112_spec.rb
508
- - spec/lib/kb/cve_2006_5467_spec.rb
509
- - spec/lib/kb/cve_2006_6303_spec.rb
510
- - spec/lib/kb/cve_2006_6852_spec.rb
511
- - spec/lib/kb/cve_2006_6979_spec.rb
512
- - spec/lib/kb/cve_2007_0469_spec.rb
513
- - spec/lib/kb/cve_2007_5162_spec.rb
514
- - spec/lib/kb/cve_2007_5379_spec.rb
515
- - spec/lib/kb/cve_2007_5380_spec.rb
516
- - spec/lib/kb/cve_2007_5770_spec.rb
517
- - spec/lib/kb/cve_2007_6077_spec.rb
518
- - spec/lib/kb/cve_2007_6612_spec.rb
519
- - spec/lib/kb/cve_2008_1145_spec.rb
520
- - spec/lib/kb/cve_2008_1891_spec.rb
521
- - spec/lib/kb/cve_2008_2376_spec.rb
522
- - spec/lib/kb/cve_2008_2662_spec.rb
523
- - spec/lib/kb/cve_2008_2663_spec.rb
524
- - spec/lib/kb/cve_2008_2664_spec.rb
525
- - spec/lib/kb/cve_2008_2725_spec.rb
526
- - spec/lib/kb/cve_2008_3655_spec.rb
527
- - spec/lib/kb/cve_2008_3657_spec.rb
528
- - spec/lib/kb/cve_2008_3790_spec.rb
529
- - spec/lib/kb/cve_2008_3905_spec.rb
530
- - spec/lib/kb/cve_2008_4094_spec.rb
531
- - spec/lib/kb/cve_2008_4310_spec.rb
532
- - spec/lib/kb/cve_2008_5189_spec.rb
533
- - spec/lib/kb/cve_2008_7248_spec.rb
534
- - spec/lib/kb/cve_2009_4078_spec.rb
535
- - spec/lib/kb/cve_2009_4124_spec.rb
536
- - spec/lib/kb/cve_2009_4214_spec.rb
537
- - spec/lib/kb/cve_2010_2489_spec.rb
538
- - spec/lib/kb/cve_2010_3933_spec.rb
539
- - spec/lib/kb/cve_2011_0188_spec.rb
540
- - spec/lib/kb/cve_2011_0739_spec.rb
541
- - spec/lib/kb/cve_2011_1004_spec.rb
542
- - spec/lib/kb/cve_2011_1005_spec.rb
543
- - spec/lib/kb/cve_2011_2686_spec.rb
544
472
  - spec/lib/kb/cve_2011_2705_spec.rb
545
473
  - spec/lib/kb/cve_2011_2930_spec.rb
546
474
  - spec/lib/kb/cve_2011_3009_spec.rb
547
475
  - spec/lib/kb/cve_2011_3187_spec.rb
548
476
  - spec/lib/kb/cve_2011_4319_spec.rb
477
+ - spec/lib/kb/cve_2012_1098_spec.rb
478
+ - spec/lib/kb/cve_2012_2139_spec.rb
479
+ - spec/lib/kb/cve_2012_2671_spec.rb
480
+ - spec/lib/kb/cve_2013_0162_spec.rb
549
481
  - spec/lib/kb/cve_2013_0256_spec.rb
550
482
  - spec/lib/kb/cve_2013_0263_spec.rb
483
+ - spec/lib/kb/cve_2013_1756_spec.rb
551
484
  - spec/lib/kb/cve_2013_2090_spec.rb
552
485
  - spec/lib/kb/cve_2013_2119_spec.rb
553
486
  - spec/lib/kb/cve_2013_5647_spec.rb