codesake-dawn 1.0.0.rc1 → 1.0.0.rc2

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: b63f07bd799c32b7133442be694cfd87935f2bfb
4
- data.tar.gz: 0f593c3a92707e690397f13a16868c23db1a99fc
3
+ metadata.gz: ead6f235a382b5141ff5b4deb9c378820bac7c9f
4
+ data.tar.gz: 1e4aa5deac922e50082aed79bae96206316da310
5
5
  SHA512:
6
- metadata.gz: f58fe979a27fd4ab321d22dab981f1a849a5c08a38865956add328a363749273e0c6b8674157d1ae5fa0b3af5c2dc407fd46fb2ad755188fdd13337b61811704
7
- data.tar.gz: 1b40549d2559097dde2840955efc6fbe7d9e906bd841879a20f47ba5ac01497ccf8e4d498f9e8ede8a9a87fab3d114506dbaa44e383b9de589d50e200da12ca8
6
+ metadata.gz: b3e0e711990a83280b447c164592644cd2844ff32ca4feecc391a33a849b6baee36162e09996e01c82a4974eadc082e27560e3c5f85cbf64c58971610d27e68e
7
+ data.tar.gz: f24b24415371c204bccf23dcb975b7a795dc228738256f40324c95455e966d0f8d4dd8f981e84b6bddebc12cc0c6330eb3e29124739d5679087f79ed3ed69028
@@ -1,8 +1,6 @@
1
1
  language: ruby
2
2
  rvm:
3
- - 1.8.7
4
3
  - 1.9.2
5
4
  - 1.9.3
6
5
  - 2.0.0
7
6
  - 2.1.0
8
- - jruby
@@ -5,9 +5,9 @@ It supports [Sinatra](http://www.sinatrarb.com),
5
5
  [Padrino](http://www.padrinorb.com) and [Ruby on Rails](http://rubyonrails.org)
6
6
  frameworks.
7
7
 
8
- _latest update: Wed Jan 8 23:50:05 CET 2014_
8
+ _latest update: Fri Jan 10 08:53:06 CET 2014_
9
9
 
10
- ## Version 1.0.0 - codename: Lightning McQueen (2014-01-10)
10
+ ## Version 1.0.0 - codename: Lightning McQueen (2014-01-xx)
11
11
 
12
12
  * Fixing issue #19 (https://github.com/codesake/codesake-dawn/issues/19). There
13
13
  was a problem on ```is_a_vulnerable_version?``` routine that flags a security
@@ -21,6 +21,8 @@ _latest update: Wed Jan 8 23:50:05 CET 2014_
21
21
  * Added a rake task to better integrate codesake-dawn in a continous
22
22
  development workflow. Now when you install codesake-dawn you have a 'rake
23
23
  dawn' task executing the tool on the current directory.
24
+ * In BasicCheck::is_vulnerable_version? Added support for the fourth version
25
+ number. We needed this to implement check for CVE-2013-7086
24
26
  * Added a check for CVE-2004-0755
25
27
  * Added a check for CVE-2004-0983
26
28
  * Added a check for CVE-2005-1992
@@ -70,7 +72,13 @@ _latest update: Wed Jan 8 23:50:05 CET 2014_
70
72
  * Added a check for CVE-2011-3009
71
73
  * Added a check for CVE-2011-3187
72
74
  * Added a check for CVE-2011-4319
75
+ * Added a check for CVE-2013-0256
76
+ * Added a check for CVE-2013-0263
73
77
  * Added a check for CVE-2013-2090
78
+ * Added a check for CVE-2013-2119
79
+ * Added a check for CVE-2013-5647
80
+ * Added a check for CVE-2013-6459
81
+ * Added a check for CVE-2013-7086
74
82
 
75
83
 
76
84
  ## Version 0.85 - codename: elevator (2013-12-17)
data/Roadmap.md CHANGED
@@ -7,10 +7,33 @@ frameworks.
7
7
 
8
8
  This is an ongoing roadmap for the dawn source code review tool.
9
9
 
10
- _latest update: Thu Jan 9 08:58:00 CET 2014_
10
+ _latest update: Fri Jan 10 17:06:04 CET 2014_
11
+
12
+ ## Version 1.0.0
13
+
14
+ * CVE-2013-2119
15
+ * CVE-2013-1756
16
+ * CVE-2013-0162
17
+ * CVE-2012-2671
18
+ * CVE-2012-2139
19
+ * CVE-2012-1098
20
+ * CVE-2007-6183
11
21
 
12
22
  ## Version 1.1.0
13
23
 
24
+ * CVE-2014-1234
25
+ * CVE-2014-1233
26
+ * CVE-2013-5671
27
+ * CVE-2013-4593
28
+ * CVE-2013-4489
29
+ * CVE-2013-4413
30
+ * CVE-2013-2516
31
+ * CVE-2013-2513
32
+ * CVE-2013-2512
33
+ * CVE-2013-1607
34
+ * move is\_vulnerable\_version? and is\_vulnerable\_patchlevel? to an adhoc class handling version comparison
35
+ * add @rubysec vulnerability database integration using rake
36
+ * create a task to check for new CVE in NVD website
14
37
  * add a language check. It will handle a ruby script as input and a ruby\_parser line as unsafe pattern. It will compile the ruby and look for the unsafe pattern
15
38
  * add a check against deprecated ruby / gems version. I will handle MVC gems right now.
16
39
 
@@ -115,11 +115,22 @@ module Codesake
115
115
  fixes.each do |fv|
116
116
  fixes_v_array = fv.split(".").map! { |n| n.to_i }
117
117
 
118
+ debug_me "target_array = #{target_v_array}"
119
+ debug_me "fixes_array = #{fixes_v_array}"
118
120
  if target_v_array[0] == fixes_v_array[0]
119
121
  ret = true if target_v_array[1] < fixes_v_array[1] # same major but previous minor
120
122
  if target_v_array[1] == fixes_v_array[1]
121
123
  ret = true if target_v_array[2] < fixes_v_array[2]
122
- ret = false if target_v_array[2] >= fixes_v_array[2]
124
+ # In order to support CVE-2013-7086 security check we must be able to
125
+ # hande the 'fourth' version number -> 1.5.0.4
126
+ debug_me "target array count = #{target_v_array.count}"
127
+ debug_me "fixes array count = #{fixes_v_array.count}"
128
+ debug_me "same patchlevel?: #{(target_v_array[2] == fixes_v_array[2])}"
129
+ if (target_v_array[2] == fixes_v_array[2]) && target_v_array.count == 4 && fixes_v_array.count == 4
130
+ ret = true if target_v_array[3] < fixes_v_array[3]
131
+ ret = false if target_v_array[3] >= fixes_v_array[3]
132
+ end
133
+ ret = false if target_v_array[2] > fixes_v_array[2]
123
134
 
124
135
  end
125
136
  end
@@ -0,0 +1,61 @@
1
+ module Codesake
2
+ module Dawn
3
+ module Kb
4
+ # Automatically created with rake on 2014-01-14
5
+ class CVE_2013_0256_a
6
+
7
+ include DependencyCheck
8
+
9
+ def initialize
10
+ message = "CVE_2013_0256_b: rdoc gem is vulnerable"
11
+
12
+ super({
13
+ :name=>"CVE-2013-0256-b",
14
+ :kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
15
+ })
16
+
17
+ self.safe_dependencies = [{:name=>"rdoc", :version=>['2.3.1', '3.13', '4.0.0']}]
18
+
19
+ end
20
+ end
21
+ class CVE_2013_0256_b
22
+ include RubyVersionCheck
23
+ def initialize
24
+ message = "CVE_2013_0256_b: ruby 1.9.x before 1.9.3-p383 and 2.0.0 before rc2 have problems"
25
+ super({
26
+ :name=>"CVE-2013-0256-b",
27
+ :kind=>Codesake::Dawn::KnowledgeBase::RUBY_VERSION_CHECK,
28
+ })
29
+ self.safe_rubies = [
30
+ {:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"p383"},
31
+ {:engine=>"ruby", :version=>"2.0.0", :patchlevel=>"p0"}
32
+ ]
33
+ end
34
+
35
+
36
+ end
37
+
38
+ class CVE_2013_0256
39
+ include ComboCheck
40
+
41
+ def initialize
42
+ message = "darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL."
43
+ super({
44
+ :name=>"CVE-2013-0256",
45
+ :cvss=>"AV:N/AC:M/Au:N/C:N/I:P/A:N",
46
+ :release_date => Date.new(2013, 3, 1),
47
+ :cwe=>"79",
48
+ :owasp=>"A3",
49
+ :applies=>["sinatra", "padrino", "rails"],
50
+ :kind=>Codesake::Dawn::KnowledgeBase::COMBO_CHECK,
51
+ :message=>message,
52
+ :mitigation=>"Please upgrade rdoc version at least to 2.3.1, 3.13 or 4.0.0. As a general rule, using the latest stable version is recommended.",
53
+ :aux_links=>["http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2"],
54
+ :checks=>[CVE_2013_0256_a.new, CVE_2013_0256_b.new]
55
+ })
56
+
57
+ end
58
+ end
59
+ end
60
+ end
61
+ end
@@ -0,0 +1,29 @@
1
+ module Codesake
2
+ module Dawn
3
+ module Kb
4
+ # Automatically created with rake on 2014-01-14
5
+ class CVE_2013_0263
6
+ include DependencyCheck
7
+
8
+ def initialize
9
+ message = "Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time."
10
+ super({
11
+ :name=>"CVE-2013-0263",
12
+ :cvss=>"AV:N/AC:H/Au:N/C:P/I:P/A:P",
13
+ :release_date => Date.new(2013, 8, 2),
14
+ :cwe=>"",
15
+ :owasp=>"A9",
16
+ :applies=>["sinatra", "padrino", "rails"],
17
+ :kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
18
+ :message=>message,
19
+ :mitigation=>"Please upgrade rack version to 1.5.2, 1.4.5, 1.3.10, 1.2.8, 1.1.6 As a general rule, using the latest stable version is recommended.",
20
+ :aux_links=>["https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ"]
21
+ })
22
+
23
+ self.safe_dependencies = [{:name=>"rack", :version=>['1.5.2', '1.4.5', '1.3.10', '1.2.8', '1.1.6']}]
24
+
25
+ end
26
+ end
27
+ end
28
+ end
29
+ end
@@ -0,0 +1,29 @@
1
+ module Codesake
2
+ module Dawn
3
+ module Kb
4
+ # Automatically created with rake on 2014-01-10
5
+ class CVE_2013_2119
6
+ include DependencyCheck
7
+
8
+ def initialize
9
+ message = "Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary \"config\" file in a directory with a predictable name in /tmp/ before it is used by the gem."
10
+ super({
11
+ :name=>"CVE-2013-2119",
12
+ :cvss=>"AV:L/AC:L/Au:N/C:P/I:P/A:P",
13
+ :release_date => Date.new(2014, 1, 3),
14
+ :cwe=>"16",
15
+ :owasp=>"A9",
16
+ :applies=>["rails", "sinatra", "padrino"],
17
+ :kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
18
+ :message=>message,
19
+ :mitigation=>"Please upgrade passenger to version 3.0.21, 4.0.5 or above",
20
+ :aux_links=>["http://blog.phusion.nl/2013/05/29/phusion-passenger-4-0-5-released/", "http://blog.phusion.nl/2013/05/29/phusion-passenger-3-0-21-released/"]
21
+ })
22
+
23
+ self.safe_dependencies = [{:name=>"passenger", :version=>['4.0.5', '3.0.21']}]
24
+
25
+ end
26
+ end
27
+ end
28
+ end
29
+ end
@@ -0,0 +1,30 @@
1
+ module Codesake
2
+ module Dawn
3
+ module Kb
4
+ # Automatically created with rake on 2014-01-14
5
+ class CVE_2013_5647
6
+ include DependencyCheck
7
+
8
+ def initialize
9
+ message = "lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename."
10
+
11
+ super({
12
+ :name=>"CVE-2013-5647",
13
+ :cvss=>"AV:N/AC:L/Au:N/C:P/I:P/A:P",
14
+ :release_date => Date.new(2013, 8, 29),
15
+ :cwe=>"94",
16
+ :owasp=>"A9",
17
+ :applies=>["sinatra", "padrino", "rails"],
18
+ :kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
19
+ :message=>message,
20
+ :mitigation=>"Please upgrade sounder version up to 1.0.1. As a general rule, using the latest stable version is recommended.",
21
+ :aux_links=>["http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html"]
22
+ })
23
+
24
+ self.safe_dependencies = [{:name=>"sounder", :version=>['1.0.2']}]
25
+
26
+ end
27
+ end
28
+ end
29
+ end
30
+ end
@@ -0,0 +1,30 @@
1
+ module Codesake
2
+ module Dawn
3
+ module Kb
4
+ # Automatically created with rake on 2014-01-14
5
+ class CVE_2013_6459
6
+ include DependencyCheck
7
+
8
+ def initialize
9
+ message = "Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via vectors involving generated pagination links."
10
+
11
+ super({
12
+ :name=>"CVE-2013-6459",
13
+ :cvss=>"AV:N/AC:M/Au:N/C:N/I:P/A:N",
14
+ :release_date => Date.new(2013, 12, 31),
15
+ :cwe=>"79",
16
+ :owasp=>"A3",
17
+ :applies=>["sinatra", "padrino", "rails"],
18
+ :kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
19
+ :message=>message,
20
+ :mitigation=>"Please upgrade will_paginage version to 3.0.5. As a general rule, using the latest stable version is recommended.",
21
+ :aux_links=>["https://github.com/mislav/will_paginate/releases/tag/v3.0.5"]
22
+ })
23
+
24
+ self.safe_dependencies = [{:name=>"will_paginate", :version=>['3.0.5']}]
25
+
26
+ end
27
+ end
28
+ end
29
+ end
30
+ end
@@ -0,0 +1,29 @@
1
+ module Codesake
2
+ module Dawn
3
+ module Kb
4
+ # Automatically created with rake on 2014-01-10
5
+ class CVE_2013_7086
6
+ include DependencyCheck
7
+
8
+ def initialize
9
+ message = "The message function in lib/webbynode/notify.rb in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message."
10
+ super({
11
+ :name=>"CVE-2013-7086",
12
+ :cvss=>"AV:N/AC:L/Au:N/C:P/I:P/A:P",
13
+ :release_date => Date.new(2013, 12, 19),
14
+ :cwe=>"94",
15
+ :owasp=>"A9",
16
+ :applies=>["rails", "sinatra", "padrino"],
17
+ :kind=>Codesake::Dawn::KnowledgeBase::DEPENDENCY_CHECK,
18
+ :message=>message,
19
+ :mitigation=>"Please upgrade webbynode up to version 1.0.5.3",
20
+ :aux_links=>["http://xforce.iss.net/xforce/xfdb/89705"]
21
+ })
22
+
23
+ self.safe_dependencies = [{:name=>"webbynode", :version=>['1.0.5.4']}]
24
+
25
+ end
26
+ end
27
+ end
28
+ end
29
+ end
@@ -129,6 +129,8 @@ require "codesake/dawn/kb/cve_2013_0155"
129
129
  require "codesake/dawn/kb/cve_2013_0156"
130
130
  require "codesake/dawn/kb/cve_2013_0175"
131
131
  require "codesake/dawn/kb/cve_2013_0233"
132
+ require "codesake/dawn/kb/cve_2013_0256"
133
+ require "codesake/dawn/kb/cve_2013_0263"
132
134
  require "codesake/dawn/kb/cve_2013_0269"
133
135
  require "codesake/dawn/kb/cve_2013_0276"
134
136
  require "codesake/dawn/kb/cve_2013_0277"
@@ -154,6 +156,7 @@ require "codesake/dawn/kb/cve_2013_1947"
154
156
  require "codesake/dawn/kb/cve_2013_1948"
155
157
  require "codesake/dawn/kb/cve_2013_2065"
156
158
  require "codesake/dawn/kb/cve_2013_2090"
159
+ require "codesake/dawn/kb/cve_2013_2119"
157
160
  require "codesake/dawn/kb/cve_2013_2615"
158
161
  require "codesake/dawn/kb/cve_2013_2616"
159
162
  require "codesake/dawn/kb/cve_2013_2617"
@@ -166,11 +169,17 @@ require "codesake/dawn/kb/cve_2013_4479"
166
169
  require "codesake/dawn/kb/cve_2013_4491"
167
170
  require "codesake/dawn/kb/cve_2013_4492"
168
171
  require "codesake/dawn/kb/cve_2013_4562"
172
+ require "codesake/dawn/kb/cve_2013_5647"
169
173
  require "codesake/dawn/kb/cve_2013_6414"
170
174
  require "codesake/dawn/kb/cve_2013_6415"
171
175
  require "codesake/dawn/kb/cve_2013_6416"
172
176
  require "codesake/dawn/kb/cve_2013_6417"
173
177
  require "codesake/dawn/kb/cve_2013_6421"
178
+ require "codesake/dawn/kb/cve_2013_6459"
179
+ require "codesake/dawn/kb/cve_2013_7086"
180
+
181
+ # CVE - 2014
182
+ # require "codesake/dawn/kb/cve_2014_1234"
174
183
 
175
184
 
176
185
  module Codesake
@@ -323,6 +332,8 @@ module Codesake
323
332
  Codesake::Dawn::Kb::CVE_2013_0156.new,
324
333
  Codesake::Dawn::Kb::CVE_2013_0175.new,
325
334
  Codesake::Dawn::Kb::CVE_2013_0233.new,
335
+ Codesake::Dawn::Kb::CVE_2013_0256.new,
336
+ Codesake::Dawn::Kb::CVE_2013_0263.new,
326
337
  Codesake::Dawn::Kb::CVE_2013_0269.new,
327
338
  Codesake::Dawn::Kb::CVE_2013_0276.new,
328
339
  Codesake::Dawn::Kb::CVE_2013_0277.new,
@@ -348,6 +359,7 @@ module Codesake
348
359
  Codesake::Dawn::Kb::CVE_2013_1948.new,
349
360
  Codesake::Dawn::Kb::CVE_2013_2065.new,
350
361
  Codesake::Dawn::Kb::CVE_2013_2090.new,
362
+ Codesake::Dawn::Kb::CVE_2013_2119.new,
351
363
  Codesake::Dawn::Kb::CVE_2013_2615.new,
352
364
  Codesake::Dawn::Kb::CVE_2013_2616.new,
353
365
  Codesake::Dawn::Kb::CVE_2013_2617.new,
@@ -360,11 +372,14 @@ module Codesake
360
372
  Codesake::Dawn::Kb::CVE_2013_4491.new,
361
373
  Codesake::Dawn::Kb::CVE_2013_4492.new,
362
374
  Codesake::Dawn::Kb::CVE_2013_4562.new,
375
+ Codesake::Dawn::Kb::CVE_2013_5647.new,
363
376
  Codesake::Dawn::Kb::CVE_2013_6414.new,
364
377
  Codesake::Dawn::Kb::CVE_2013_6415.new,
365
378
  Codesake::Dawn::Kb::CVE_2013_6416.new,
366
379
  Codesake::Dawn::Kb::CVE_2013_6417.new,
367
380
  Codesake::Dawn::Kb::CVE_2013_6421.new,
381
+ Codesake::Dawn::Kb::CVE_2013_6459.new,
382
+ Codesake::Dawn::Kb::CVE_2013_7086.new,
368
383
 
369
384
  ]
370
385
  end
@@ -10,9 +10,9 @@ module Codesake
10
10
  # "Finn McMissile" - v 1.3.0
11
11
  # "Fillmore" - v 1.4.0
12
12
 
13
- VERSION = "1.0.0.rc1"
13
+ VERSION = "1.0.0.rc2"
14
14
  CODENAME = "Lightning McQueen"
15
- RELEASE = "20140110"
15
+ RELEASE = "20140114"
16
16
 
17
17
  end
18
18
  end
@@ -712,5 +712,35 @@ end
712
712
  sc = kb.find("CVE-2007-5162")
713
713
  sc.should_not be_nil
714
714
  sc.class.should == Codesake::Dawn::Kb::CVE_2007_5162
715
+ end
716
+ it "must have test for CVE-2013-2119" do
717
+ sc = kb.find("CVE-2013-2119")
718
+ sc.should_not be_nil
719
+ sc.class.should == Codesake::Dawn::Kb::CVE_2013_2119
720
+ end
721
+ it "must have test for CVE-2013-7086" do
722
+ sc = kb.find("CVE-2013-7086")
723
+ sc.should_not be_nil
724
+ sc.class.should == Codesake::Dawn::Kb::CVE_2013_7086
725
+ end
726
+ it "must have test for CVE-2013-6459" do
727
+ sc = kb.find("CVE-2013-6459")
728
+ sc.should_not be_nil
729
+ sc.class.should == Codesake::Dawn::Kb::CVE_2013_6459
730
+ end
731
+ it "must have test for CVE-2013-5647" do
732
+ sc = kb.find("CVE-2013-5647")
733
+ sc.should_not be_nil
734
+ sc.class.should == Codesake::Dawn::Kb::CVE_2013_5647
735
+ end
736
+ it "must have test for CVE-2013-0263" do
737
+ sc = kb.find("CVE-2013-0263")
738
+ sc.should_not be_nil
739
+ sc.class.should == Codesake::Dawn::Kb::CVE_2013_0263
740
+ end
741
+ it "must have test for CVE-2013-0256" do
742
+ sc = kb.find("CVE-2013-0256")
743
+ sc.should_not be_nil
744
+ sc.class.should == Codesake::Dawn::Kb::CVE_2013_0256
715
745
  end
716
746
  end
@@ -0,0 +1,8 @@
1
+ require 'spec_helper'
2
+ describe "The CVE-2013-0256 vulnerability" do
3
+ before(:all) do
4
+ @check = Codesake::Dawn::Kb::CVE_2013_0256.new
5
+ # @check.debug = true
6
+ end
7
+ it "needs some test..."
8
+ end
@@ -0,0 +1,8 @@
1
+ require 'spec_helper'
2
+ describe "The CVE-2013-0263 vulnerability" do
3
+ before(:all) do
4
+ @check = Codesake::Dawn::Kb::CVE_2013_0263.new
5
+ # @check.debug = true
6
+ end
7
+ it "needs some test..."
8
+ end
@@ -0,0 +1,8 @@
1
+ require 'spec_helper'
2
+ describe "The CVE-2013-2119 vulnerability" do
3
+ before(:all) do
4
+ @check = Codesake::Dawn::Kb::CVE_2013_2119.new
5
+ # @check.debug = true
6
+ end
7
+ it "needs some test..."
8
+ end
@@ -0,0 +1,8 @@
1
+ require 'spec_helper'
2
+ describe "The CVE-2013-5647 vulnerability" do
3
+ before(:all) do
4
+ @check = Codesake::Dawn::Kb::CVE_2013_5647.new
5
+ # @check.debug = true
6
+ end
7
+ it "needs some test..."
8
+ end
@@ -0,0 +1,8 @@
1
+ require 'spec_helper'
2
+ describe "The CVE-2013-6459 vulnerability" do
3
+ before(:all) do
4
+ @check = Codesake::Dawn::Kb::CVE_2013_6459.new
5
+ # @check.debug = true
6
+ end
7
+ it "needs some test..."
8
+ end
@@ -0,0 +1,22 @@
1
+ require 'spec_helper'
2
+ describe "The CVE-2013-7086 vulnerability" do
3
+ before(:all) do
4
+ @check = Codesake::Dawn::Kb::CVE_2013_7086.new
5
+ @check.debug = true
6
+ end
7
+ it "is detected for gem 1.0.5.3" do
8
+ @check.dependencies = [{:name=>"webbynode", :version=>'1.0.5.3'}]
9
+ @check.vuln?.should be_true
10
+ end
11
+
12
+ it "is detected for gem 1.0.4.3" do
13
+ @check.dependencies = [{:name=>"webbynode", :version=>'1.0.4.3'}]
14
+ @check.vuln?.should be_true
15
+ end
16
+
17
+ it "is not detected for gem 1.0.5.4" do
18
+ @check.dependencies = [{:name=>"webbynode", :version=>'1.0.5.4'}]
19
+ @check.vuln?.should be_false
20
+ end
21
+
22
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: codesake-dawn
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.0.rc1
4
+ version: 1.0.0.rc2
5
5
  platform: ruby
6
6
  authors:
7
7
  - Paolo Perego
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2014-01-10 00:00:00.000000000 Z
11
+ date: 2014-01-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: codesake-commons
@@ -324,6 +324,8 @@ files:
324
324
  - lib/codesake/dawn/kb/cve_2013_0156.rb
325
325
  - lib/codesake/dawn/kb/cve_2013_0175.rb
326
326
  - lib/codesake/dawn/kb/cve_2013_0233.rb
327
+ - lib/codesake/dawn/kb/cve_2013_0256.rb
328
+ - lib/codesake/dawn/kb/cve_2013_0263.rb
327
329
  - lib/codesake/dawn/kb/cve_2013_0269.rb
328
330
  - lib/codesake/dawn/kb/cve_2013_0276.rb
329
331
  - lib/codesake/dawn/kb/cve_2013_0277.rb
@@ -349,6 +351,7 @@ files:
349
351
  - lib/codesake/dawn/kb/cve_2013_1948.rb
350
352
  - lib/codesake/dawn/kb/cve_2013_2065.rb
351
353
  - lib/codesake/dawn/kb/cve_2013_2090.rb
354
+ - lib/codesake/dawn/kb/cve_2013_2119.rb
352
355
  - lib/codesake/dawn/kb/cve_2013_2615.rb
353
356
  - lib/codesake/dawn/kb/cve_2013_2616.rb
354
357
  - lib/codesake/dawn/kb/cve_2013_2617.rb
@@ -361,11 +364,14 @@ files:
361
364
  - lib/codesake/dawn/kb/cve_2013_4491.rb
362
365
  - lib/codesake/dawn/kb/cve_2013_4492.rb
363
366
  - lib/codesake/dawn/kb/cve_2013_4562.rb
367
+ - lib/codesake/dawn/kb/cve_2013_5647.rb
364
368
  - lib/codesake/dawn/kb/cve_2013_6414.rb
365
369
  - lib/codesake/dawn/kb/cve_2013_6415.rb
366
370
  - lib/codesake/dawn/kb/cve_2013_6416.rb
367
371
  - lib/codesake/dawn/kb/cve_2013_6417.rb
368
372
  - lib/codesake/dawn/kb/cve_2013_6421.rb
373
+ - lib/codesake/dawn/kb/cve_2013_6459.rb
374
+ - lib/codesake/dawn/kb/cve_2013_7086.rb
369
375
  - lib/codesake/dawn/kb/dependency_check.rb
370
376
  - lib/codesake/dawn/kb/nokogiri_dos_20131217.rb
371
377
  - lib/codesake/dawn/kb/nokogiri_entityexpansion_dos_20131217.rb
@@ -444,7 +450,13 @@ files:
444
450
  - spec/lib/kb/cve_2011_3009_spec.rb
445
451
  - spec/lib/kb/cve_2011_3187_spec.rb
446
452
  - spec/lib/kb/cve_2011_4319_spec.rb
453
+ - spec/lib/kb/cve_2013_0256_spec.rb
454
+ - spec/lib/kb/cve_2013_0263_spec.rb
447
455
  - spec/lib/kb/cve_2013_2090_spec.rb
456
+ - spec/lib/kb/cve_2013_2119_spec.rb
457
+ - spec/lib/kb/cve_2013_5647_spec.rb
458
+ - spec/lib/kb/cve_2013_6459_spec.rb
459
+ - spec/lib/kb/cve_2013_7086_spec.rb
448
460
  - spec/lib/kb/owasp_ror_cheatsheet_disabled.rb
449
461
  - spec/spec_helper.rb
450
462
  homepage: http://dawn.codesake.com
@@ -534,6 +546,12 @@ test_files:
534
546
  - spec/lib/kb/cve_2011_3009_spec.rb
535
547
  - spec/lib/kb/cve_2011_3187_spec.rb
536
548
  - spec/lib/kb/cve_2011_4319_spec.rb
549
+ - spec/lib/kb/cve_2013_0256_spec.rb
550
+ - spec/lib/kb/cve_2013_0263_spec.rb
537
551
  - spec/lib/kb/cve_2013_2090_spec.rb
552
+ - spec/lib/kb/cve_2013_2119_spec.rb
553
+ - spec/lib/kb/cve_2013_5647_spec.rb
554
+ - spec/lib/kb/cve_2013_6459_spec.rb
555
+ - spec/lib/kb/cve_2013_7086_spec.rb
538
556
  - spec/lib/kb/owasp_ror_cheatsheet_disabled.rb
539
557
  - spec/spec_helper.rb