dawnscanner 1.2.99
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- checksums.yaml.gz.sig +4 -0
- data.tar.gz.sig +0 -0
- data/.gitignore +19 -0
- data/.ruby-gemset +1 -0
- data/.ruby-version +1 -0
- data/.travis.yml +8 -0
- data/Changelog.md +412 -0
- data/Gemfile +4 -0
- data/KnowledgeBase.md +213 -0
- data/LICENSE.txt +22 -0
- data/README.md +354 -0
- data/Rakefile +250 -0
- data/Roadmap.md +59 -0
- data/bin/dawn +210 -0
- data/certs/paolo_at_codesake_dot_com.pem +21 -0
- data/checksum/.placeholder +0 -0
- data/checksum/codesake-dawn-1.1.0.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.1.0.rc1.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.1.1.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.1.2.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.1.3.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.2.0.gem.sha512 +1 -0
- data/checksum/codesake-dawn-1.2.99.gem.sha512 +1 -0
- data/dawnscanner.gemspec +43 -0
- data/doc/codesake-dawn.yaml.sample +26 -0
- data/doc/dawn_1_0_announcement.md +139 -0
- data/doc/dawn_1_1_announcement.md +67 -0
- data/doc/dawn_1_2_announcement.md +69 -0
- data/features/dawn_complains_about_an_incorrect_command_line.feature.disabled +21 -0
- data/features/dawn_scan_a_secure_sinatra_app.feature.disabled +31 -0
- data/features/dawn_scan_a_vulnerable_sinatra_app.feature.disabled +36 -0
- data/features/step_definition/dawn_steps.rb +19 -0
- data/features/support/env.rb +1 -0
- data/lib/codesake-dawn.rb +12 -0
- data/lib/codesake/dawn/core.rb +175 -0
- data/lib/codesake/dawn/engine.rb +380 -0
- data/lib/codesake/dawn/gemfile_lock.rb +12 -0
- data/lib/codesake/dawn/kb/basic_check.rb +228 -0
- data/lib/codesake/dawn/kb/combo_check.rb +64 -0
- data/lib/codesake/dawn/kb/cve_2004_0755.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2004_0983.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2005_1992.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2005_2337.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2006_1931.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2006_2582.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2006_3694.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2006_4112.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2006_5467.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2006_6303.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2006_6852.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2006_6979.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2007_0469.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2007_5162.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2007_5379.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2007_5380.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2007_5770.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2007_6077.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2007_6612.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2008_1145.rb +40 -0
- data/lib/codesake/dawn/kb/cve_2008_1891.rb +40 -0
- data/lib/codesake/dawn/kb/cve_2008_2376.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2008_2662.rb +35 -0
- data/lib/codesake/dawn/kb/cve_2008_2663.rb +34 -0
- data/lib/codesake/dawn/kb/cve_2008_2664.rb +35 -0
- data/lib/codesake/dawn/kb/cve_2008_2725.rb +33 -0
- data/lib/codesake/dawn/kb/cve_2008_3655.rb +39 -0
- data/lib/codesake/dawn/kb/cve_2008_3657.rb +39 -0
- data/lib/codesake/dawn/kb/cve_2008_3790.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2008_3905.rb +38 -0
- data/lib/codesake/dawn/kb/cve_2008_4094.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2008_4310.rb +103 -0
- data/lib/codesake/dawn/kb/cve_2008_5189.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2008_7248.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2009_4078.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2009_4124.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2009_4214.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2010_1330.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2010_2489.rb +62 -0
- data/lib/codesake/dawn/kb/cve_2010_3933.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2011_0188.rb +69 -0
- data/lib/codesake/dawn/kb/cve_2011_0446.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_0447.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_0739.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_0995.rb +63 -0
- data/lib/codesake/dawn/kb/cve_2011_1004.rb +36 -0
- data/lib/codesake/dawn/kb/cve_2011_1005.rb +33 -0
- data/lib/codesake/dawn/kb/cve_2011_2197.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2011_2686.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2011_2705.rb +34 -0
- data/lib/codesake/dawn/kb/cve_2011_2929.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2011_2930.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_2931.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2011_2932.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2011_3009.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_3186.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2011_3187.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2011_4319.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2011_4815.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2011_5036.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2012_1098.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2012_1099.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_1241.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_2139.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2012_2140.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_2660.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2012_2661.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_2671.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2012_2694.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2012_2695.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_3424.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2012_3463.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_3464.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_3465.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2012_4464.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_4466.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_4481.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2012_4522.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_5370.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_5371.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_5380.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2012_6109.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2012_6134.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2012_6496.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2012_6497.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_0155.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_0156.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_0162.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_0175.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_0183.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_0184.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_0233.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_0256.rb +61 -0
- data/lib/codesake/dawn/kb/cve_2013_0262.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_0263.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_0269.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_0276.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_0277.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_0284.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_0285.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_0333.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_1607.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_1655.rb +67 -0
- data/lib/codesake/dawn/kb/cve_2013_1656.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_1756.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_1800.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_1801.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1802.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1812.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1821.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_1854.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_1855.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_1856.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_1857.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1875.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1898.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1911.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_1933.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1947.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_1948.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_2065.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_2090.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_2105.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_2119.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_2512.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_2513.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_2516.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_2615.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_2616.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_2617.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_3221.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_4164.rb +32 -0
- data/lib/codesake/dawn/kb/cve_2013_4203.rb +27 -0
- data/lib/codesake/dawn/kb/cve_2013_4389.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_4413.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_4457.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_4478.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_4479.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_4489.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_4491.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_4492.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_4562.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_4593.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2013_5647.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_5671.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2013_6414.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_6415.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_6416.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_6417.rb +31 -0
- data/lib/codesake/dawn/kb/cve_2013_6421.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_6459.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2013_6460.rb +55 -0
- data/lib/codesake/dawn/kb/cve_2013_6461.rb +59 -0
- data/lib/codesake/dawn/kb/cve_2013_7086.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2014_0036.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2014_0080.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2014_0081.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2014_0082.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2014_0130.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2014_1233.rb +29 -0
- data/lib/codesake/dawn/kb/cve_2014_1234.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2014_2322.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2014_2525.rb +61 -0
- data/lib/codesake/dawn/kb/cve_2014_2538.rb +28 -0
- data/lib/codesake/dawn/kb/cve_2014_3482.rb +30 -0
- data/lib/codesake/dawn/kb/cve_2014_3483.rb +29 -0
- data/lib/codesake/dawn/kb/dependency_check.rb +86 -0
- data/lib/codesake/dawn/kb/deprecation_check.rb +40 -0
- data/lib/codesake/dawn/kb/not_revised_code.rb +24 -0
- data/lib/codesake/dawn/kb/operating_system_check.rb +98 -0
- data/lib/codesake/dawn/kb/osvdb_105971.rb +31 -0
- data/lib/codesake/dawn/kb/osvdb_108530.rb +29 -0
- data/lib/codesake/dawn/kb/osvdb_108563.rb +30 -0
- data/lib/codesake/dawn/kb/osvdb_108569.rb +30 -0
- data/lib/codesake/dawn/kb/osvdb_108570.rb +29 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet.rb +41 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/check_for_backup_files.rb +22 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/check_for_safe_redirect_and_forward.rb +59 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/command_injection.rb +30 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/csrf.rb +31 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/mass_assignment_in_model.rb +35 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/security_related_headers.rb +38 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/sensitive_files.rb +31 -0
- data/lib/codesake/dawn/kb/owasp_ror_cheatsheet/session_stored_in_database.rb +33 -0
- data/lib/codesake/dawn/kb/pattern_match_check.rb +129 -0
- data/lib/codesake/dawn/kb/ruby_version_check.rb +91 -0
- data/lib/codesake/dawn/kb/simpleform_xss_20131129.rb +30 -0
- data/lib/codesake/dawn/kb/version_check.rb +418 -0
- data/lib/codesake/dawn/knowledge_base.rb +513 -0
- data/lib/codesake/dawn/padrino.rb +82 -0
- data/lib/codesake/dawn/rails.rb +17 -0
- data/lib/codesake/dawn/railtie.rb +9 -0
- data/lib/codesake/dawn/reporter.rb +280 -0
- data/lib/codesake/dawn/sinatra.rb +129 -0
- data/lib/codesake/dawn/tasks.rb +27 -0
- data/lib/codesake/dawn/utils.rb +21 -0
- data/lib/codesake/dawn/version.rb +28 -0
- data/lib/tasks/codesake-dawn_tasks.rake +1 -0
- data/spec/lib/dawn/codesake_core_spec.rb +9 -0
- data/spec/lib/dawn/codesake_knowledgebase_spec.rb +940 -0
- data/spec/lib/dawn/codesake_padrino_engine_disabled.rb +45 -0
- data/spec/lib/dawn/codesake_rails_engine_disabled.rb +12 -0
- data/spec/lib/dawn/codesake_sinatra_engine_disabled.rb +128 -0
- data/spec/lib/kb/codesake_cve_2013_0175_spec.rb +35 -0
- data/spec/lib/kb/codesake_cve_2013_4457_spec.rb +41 -0
- data/spec/lib/kb/codesake_dependency_version_check_spec.rb +76 -0
- data/spec/lib/kb/codesake_deprecation_check_spec.rb +56 -0
- data/spec/lib/kb/codesake_ruby_version_check_spec.rb +40 -0
- data/spec/lib/kb/codesake_version_check_spec.rb +165 -0
- data/spec/lib/kb/cve_2011_2705_spec.rb +35 -0
- data/spec/lib/kb/cve_2011_2930_spec.rb +31 -0
- data/spec/lib/kb/cve_2011_3009_spec.rb +25 -0
- data/spec/lib/kb/cve_2011_3187_spec.rb +24 -0
- data/spec/lib/kb/cve_2011_4319_spec.rb +44 -0
- data/spec/lib/kb/cve_2011_5036_spec.rb +95 -0
- data/spec/lib/kb/cve_2012_1098_spec.rb +36 -0
- data/spec/lib/kb/cve_2012_2139_spec.rb +20 -0
- data/spec/lib/kb/cve_2012_2671_spec.rb +23 -0
- data/spec/lib/kb/cve_2012_6109_spec.rb +112 -0
- data/spec/lib/kb/cve_2013_0162_spec.rb +23 -0
- data/spec/lib/kb/cve_2013_0183_spec.rb +54 -0
- data/spec/lib/kb/cve_2013_0184_spec.rb +115 -0
- data/spec/lib/kb/cve_2013_0256_spec.rb +34 -0
- data/spec/lib/kb/cve_2013_0262_spec.rb +44 -0
- data/spec/lib/kb/cve_2013_0263_spec.rb +11 -0
- data/spec/lib/kb/cve_2013_1607_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_1655_spec.rb +31 -0
- data/spec/lib/kb/cve_2013_1756_spec.rb +23 -0
- data/spec/lib/kb/cve_2013_2090_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_2105_spec.rb +11 -0
- data/spec/lib/kb/cve_2013_2119_spec.rb +27 -0
- data/spec/lib/kb/cve_2013_2512_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_2513_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_2516_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_4203_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_4413_spec.rb +16 -0
- data/spec/lib/kb/cve_2013_4489_spec.rb +63 -0
- data/spec/lib/kb/cve_2013_4593_spec.rb +16 -0
- data/spec/lib/kb/cve_2013_5647_spec.rb +19 -0
- data/spec/lib/kb/cve_2013_5671_spec.rb +27 -0
- data/spec/lib/kb/cve_2013_6416_spec.rb +31 -0
- data/spec/lib/kb/cve_2013_6459_spec.rb +15 -0
- data/spec/lib/kb/cve_2013_7086_spec.rb +22 -0
- data/spec/lib/kb/cve_2014_0036_spec.rb +15 -0
- data/spec/lib/kb/cve_2014_0080_spec.rb +28 -0
- data/spec/lib/kb/cve_2014_0081_spec.rb +68 -0
- data/spec/lib/kb/cve_2014_0082_spec.rb +52 -0
- data/spec/lib/kb/cve_2014_0130_spec.rb +19 -0
- data/spec/lib/kb/cve_2014_1233_spec.rb +15 -0
- data/spec/lib/kb/cve_2014_1234_spec.rb +16 -0
- data/spec/lib/kb/cve_2014_2322_spec.rb +15 -0
- data/spec/lib/kb/cve_2014_2538_spec.rb +15 -0
- data/spec/lib/kb/cve_2014_3482_spec.rb +15 -0
- data/spec/lib/kb/cve_2014_3483_spec.rb +23 -0
- data/spec/lib/kb/osvdb_105971_spec.rb +15 -0
- data/spec/lib/kb/osvdb_108530_spec.rb +22 -0
- data/spec/lib/kb/osvdb_108563_spec.rb +18 -0
- data/spec/lib/kb/osvdb_108569_spec.rb +17 -0
- data/spec/lib/kb/osvdb_108570_spec.rb +17 -0
- data/spec/lib/kb/owasp_ror_cheatsheet_disabled.rb +56 -0
- data/spec/spec_helper.rb +11 -0
- data/support/bootstrap.js +2027 -0
- data/support/bootstrap.min.css +9 -0
- data/support/codesake.css +63 -0
- metadata +659 -0
- metadata.gz.sig +0 -0
@@ -0,0 +1,23 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-0162 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_0162.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "is reported when ruby_parser version 1.x is used" do
|
8
|
+
@check.dependencies = [{:name=>"ruby_parser", :version=>'1.4.5'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "is reported when ruby_parser version 2.x is used" do
|
12
|
+
@check.dependencies = [{:name=>"ruby_parser", :version=>'2.4.5'}]
|
13
|
+
@check.vuln?.should be_true
|
14
|
+
end
|
15
|
+
it "is reported when ruby_parser version 3.0.x is used" do
|
16
|
+
@check.dependencies = [{:name=>"ruby_parser", :version=>'3.0.5'}]
|
17
|
+
@check.vuln?.should be_true
|
18
|
+
end
|
19
|
+
it "is not reported when ruby_parser version 3.1.1 is used" do
|
20
|
+
@check.dependencies = [{:name=>"ruby_parser", :version=>'3.1.1'}]
|
21
|
+
@check.vuln?.should be_false
|
22
|
+
end
|
23
|
+
end
|
@@ -0,0 +1,54 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-0183 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_0183.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
|
8
|
+
it "is reported when the vulnerable gem is detected - 1.3.0" do
|
9
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.0"}]
|
10
|
+
@check.vuln?.should be_true
|
11
|
+
end
|
12
|
+
|
13
|
+
it "is reported when the vulnerable gem is detected - 1.3.1" do
|
14
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.1"}]
|
15
|
+
@check.vuln?.should be_true
|
16
|
+
end
|
17
|
+
it "is reported when the vulnerable gem is detected - 1.3.2" do
|
18
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.2"}]
|
19
|
+
@check.vuln?.should be_true
|
20
|
+
end
|
21
|
+
it "is reported when the vulnerable gem is detected - 1.3.3" do
|
22
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.3"}]
|
23
|
+
@check.vuln?.should be_true
|
24
|
+
end
|
25
|
+
it "is reported when the vulnerable gem is detected - 1.3.4" do
|
26
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.4"}]
|
27
|
+
@check.vuln?.should be_true
|
28
|
+
end
|
29
|
+
it "is reported when the vulnerable gem is detected - 1.3.5" do
|
30
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.5"}]
|
31
|
+
@check.vuln?.should be_true
|
32
|
+
end
|
33
|
+
it "is reported when the vulnerable gem is detected - 1.3.6" do
|
34
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.6"}]
|
35
|
+
@check.vuln?.should be_true
|
36
|
+
end
|
37
|
+
it "is reported when the vulnerable gem is detected - 1.3.7" do
|
38
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.7"}]
|
39
|
+
@check.vuln?.should be_true
|
40
|
+
end
|
41
|
+
|
42
|
+
it "is reported when the vulnerable gem is detected - 1.4.0" do
|
43
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.0"}]
|
44
|
+
@check.vuln?.should be_true
|
45
|
+
end
|
46
|
+
it "is reported when the vulnerable gem is detected - 1.4.1" do
|
47
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.1"}]
|
48
|
+
@check.vuln?.should be_true
|
49
|
+
end
|
50
|
+
it "is reported when the vulnerable gem is detected - 1.4.2" do
|
51
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.2"}]
|
52
|
+
@check.vuln?.should be_true
|
53
|
+
end
|
54
|
+
end
|
@@ -0,0 +1,115 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-0184 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_0184.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
|
8
|
+
it "is reported when the vulnerable gem is detected - 1.1.0" do
|
9
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.1.0"}]
|
10
|
+
@check.vuln?.should be_true
|
11
|
+
end
|
12
|
+
it "is reported when the vulnerable gem is detected - 1.1.3" do
|
13
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.1.3"}]
|
14
|
+
@check.vuln?.should be_true
|
15
|
+
end
|
16
|
+
it "is reported when the vulnerable gem is detected - 1.1.2" do
|
17
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.1.2"}]
|
18
|
+
@check.vuln?.should be_true
|
19
|
+
end
|
20
|
+
it "is reported when the vulnerable gem is detected - 1.1.4" do
|
21
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.1.4"}]
|
22
|
+
@check.vuln?.should be_true
|
23
|
+
end
|
24
|
+
it "is reported when the vulnerable gem is detected - 1.2.0" do
|
25
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.2.0"}]
|
26
|
+
@check.vuln?.should be_true
|
27
|
+
end
|
28
|
+
|
29
|
+
it "is reported when the vulnerable gem is detected - 1.2.1" do
|
30
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.2.1"}]
|
31
|
+
@check.vuln?.should be_true
|
32
|
+
end
|
33
|
+
it "is reported when the vulnerable gem is detected - 1.2.2" do
|
34
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.2.2"}]
|
35
|
+
@check.vuln?.should be_true
|
36
|
+
end
|
37
|
+
it "is reported when the vulnerable gem is detected - 1.2.3" do
|
38
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.2.3"}]
|
39
|
+
@check.vuln?.should be_true
|
40
|
+
end
|
41
|
+
it "is reported when the vulnerable gem is detected - 1.2.4" do
|
42
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.2.4"}]
|
43
|
+
@check.vuln?.should be_true
|
44
|
+
end
|
45
|
+
it "is reported when the vulnerable gem is detected - 1.2.5" do
|
46
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.2.5"}]
|
47
|
+
@check.vuln?.should be_true
|
48
|
+
end
|
49
|
+
it "is reported when the vulnerable gem is detected - 1.2.6" do
|
50
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.2.6"}]
|
51
|
+
@check.vuln?.should be_true
|
52
|
+
end
|
53
|
+
it "is reported when the vulnerable gem is detected - 1.3.0" do
|
54
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.0"}]
|
55
|
+
@check.vuln?.should be_true
|
56
|
+
end
|
57
|
+
|
58
|
+
it "is reported when the vulnerable gem is detected - 1.3.1" do
|
59
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.1"}]
|
60
|
+
@check.vuln?.should be_true
|
61
|
+
end
|
62
|
+
it "is reported when the vulnerable gem is detected - 1.3.2" do
|
63
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.2"}]
|
64
|
+
@check.vuln?.should be_true
|
65
|
+
end
|
66
|
+
it "is reported when the vulnerable gem is detected - 1.3.3" do
|
67
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.3"}]
|
68
|
+
@check.vuln?.should be_true
|
69
|
+
end
|
70
|
+
it "is reported when the vulnerable gem is detected - 1.3.4" do
|
71
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.4"}]
|
72
|
+
@check.vuln?.should be_true
|
73
|
+
end
|
74
|
+
it "is reported when the vulnerable gem is detected - 1.3.5" do
|
75
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.5"}]
|
76
|
+
@check.vuln?.should be_true
|
77
|
+
end
|
78
|
+
it "is reported when the vulnerable gem is detected - 1.3.6" do
|
79
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.6"}]
|
80
|
+
@check.vuln?.should be_true
|
81
|
+
end
|
82
|
+
it "is reported when the vulnerable gem is detected - 1.3.7" do
|
83
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.7"}]
|
84
|
+
@check.vuln?.should be_true
|
85
|
+
end
|
86
|
+
it "is reported when the vulnerable gem is detected - 1.3.8" do
|
87
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.3.8"}]
|
88
|
+
@check.vuln?.should be_true
|
89
|
+
end
|
90
|
+
it "is reported when the vulnerable gem is detected" do
|
91
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.0"}]
|
92
|
+
@check.vuln?.should be_true
|
93
|
+
end
|
94
|
+
it "is reported when the vulnerable gem is detected" do
|
95
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.1"}]
|
96
|
+
@check.vuln?.should be_true
|
97
|
+
end
|
98
|
+
it "is reported when the vulnerable gem is detected" do
|
99
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.2"}]
|
100
|
+
@check.vuln?.should be_true
|
101
|
+
end
|
102
|
+
it "is reported when the vulnerable gem is detected" do
|
103
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.3"}]
|
104
|
+
@check.vuln?.should be_true
|
105
|
+
end
|
106
|
+
|
107
|
+
it "is not reported when a fixed release is detected" do
|
108
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.5"}]
|
109
|
+
@check.vuln?.should be_false
|
110
|
+
end
|
111
|
+
it "is not reported when a fixed release is detected" do
|
112
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.5.2"}]
|
113
|
+
@check.vuln?.should be_false
|
114
|
+
end
|
115
|
+
end
|
@@ -0,0 +1,34 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-0256 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_0256.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "fires when vulnerable ruby (1.9.3-p382) and rdoc version (2.3.0) has been found" do
|
8
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"381"}, :dependencies=>[{:name=>"rdoc", :version=>'2.3.0'}, :root_dir=>"."]}
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "fires when vulnerable ruby (1.9.2-p342) and rdoc version (2.3.0) has been found" do
|
12
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.2", :patchlevel=>"342"}, :dependencies=>[{:name=>"rdoc", :version=>'2.3.0'}, :root_dir=>"."]}
|
13
|
+
@check.vuln?.should be_true
|
14
|
+
end
|
15
|
+
|
16
|
+
it "fires when vulnerable ruby (1.9.3-p382) and rdoc version (3.12) has been found" do
|
17
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"381"}, :dependencies=>[{:name=>"rdoc", :version=>'3.12'}, :root_dir=>"."]}
|
18
|
+
@check.vuln?.should be_true
|
19
|
+
end
|
20
|
+
it "fires when vulnerable ruby (1.9.2-p342) and rdoc version (3.12) has been found" do
|
21
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.2", :patchlevel=>"342"}, :dependencies=>[{:name=>"rdoc", :version=>'3.12'}, :root_dir=>"."]}
|
22
|
+
@check.vuln?.should be_true
|
23
|
+
end
|
24
|
+
|
25
|
+
it "doesn't fire when not vulnerable ruby (1.9.3-p383) is found but vulnerable rdoc version (3.12) has been found" do
|
26
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"383"}, :dependencies=>[{:name=>"rdoc", :version=>'3.12'}, :root_dir=>"."]}
|
27
|
+
@check.vuln?.should be_false
|
28
|
+
end
|
29
|
+
|
30
|
+
it "doesn't fire when vulnerable ruby (1.9.3-p382) is found but not vulnerable rdoc version (3.13) has been found" do
|
31
|
+
@check.options={:detected_ruby=>{:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"322"}, :dependencies=>[{:name=>"rdoc", :version=>'3.13'}, :root_dir=>"."]}
|
32
|
+
@check.vuln?.should be_false
|
33
|
+
end
|
34
|
+
end
|
@@ -0,0 +1,44 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-0262 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_0262.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
|
8
|
+
it "is reported when the vulnerable gem is detected" do
|
9
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.5.0"}]
|
10
|
+
@check.vuln?.should be_true
|
11
|
+
end
|
12
|
+
it "is reported when the vulnerable gem is detected" do
|
13
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.5.1"}]
|
14
|
+
@check.vuln?.should be_true
|
15
|
+
end
|
16
|
+
it "is reported when the vulnerable gem is detected" do
|
17
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.0"}]
|
18
|
+
@check.vuln?.should be_true
|
19
|
+
end
|
20
|
+
it "is reported when the vulnerable gem is detected" do
|
21
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.1"}]
|
22
|
+
@check.vuln?.should be_true
|
23
|
+
end
|
24
|
+
it "is reported when the vulnerable gem is detected" do
|
25
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.2"}]
|
26
|
+
@check.vuln?.should be_true
|
27
|
+
end
|
28
|
+
it "is reported when the vulnerable gem is detected" do
|
29
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.3"}]
|
30
|
+
@check.vuln?.should be_true
|
31
|
+
end
|
32
|
+
it "is reported when the vulnerable gem is detected" do
|
33
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.4"}]
|
34
|
+
@check.vuln?.should be_true
|
35
|
+
end
|
36
|
+
it "is not reported when a fixed release is detected" do
|
37
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.4.5"}]
|
38
|
+
@check.vuln?.should be_false
|
39
|
+
end
|
40
|
+
it "is not reported when a fixed release is detected" do
|
41
|
+
@check.dependencies = [{:name=>"rack", :version=>"1.5.2"}]
|
42
|
+
@check.vuln?.should be_false
|
43
|
+
end
|
44
|
+
end
|
@@ -0,0 +1,11 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-0263 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_0263.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "is not reported when rack version 1.4.5 is used" do
|
8
|
+
@check.dependencies = [{:name=>"rack", :version=>'1.4.5'}]
|
9
|
+
@check.vuln?.should be_false
|
10
|
+
end
|
11
|
+
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-1607 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_1607.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "is reported when a pdfkit gem version 0.5.2 is detected" do
|
8
|
+
@check.dependencies = [{:name=>"pdfkit", :version=>"0.5.2"}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "is not reported when a pdfkit gem version 0.5.3 is detected" do
|
12
|
+
@check.dependencies = [{:name=>"pdfkit", :version=>"0.5.3"}]
|
13
|
+
@check.vuln?.should be_false
|
14
|
+
end
|
15
|
+
end
|
@@ -0,0 +1,31 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
|
3
|
+
describe "The CVE-2013-1655 vulnerability" do
|
4
|
+
before(:all) do
|
5
|
+
@check = Codesake::Dawn::Kb::CVE_2013_1655.new
|
6
|
+
# @check.debug = true
|
7
|
+
end
|
8
|
+
it "is detected if vulnerable version of puppet rubygem is detect when running on ruby 1.9.3 and 2.0.0" do
|
9
|
+
@check.options[:dependencies]=[{:name=>"puppet", :version=>'2.7.20'}]
|
10
|
+
@check.options[:detected_ruby] = {:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"p342"}
|
11
|
+
@check.vuln?.should be_true
|
12
|
+
end
|
13
|
+
it "is ignored if only vulnerable version of puppet rubygem has been found" do
|
14
|
+
@check.options[:detected_ruby] = {:engine=>"ruby", :version=>"1.8.7", :patchlevel=>"p358"}
|
15
|
+
@check.vuln?.should be_false
|
16
|
+
end
|
17
|
+
|
18
|
+
it "is ignored if only the vulnerable ruby interpreter version has been found" do
|
19
|
+
@check.options[:dependencies]=[{:name=>"puppet", :version=>'8.7.21'}]
|
20
|
+
@check.options[:detected_ruby] = {:engine=>"ruby", :version=>"1.9.3", :patchlevel=>"p342"}
|
21
|
+
# @check.dump_status
|
22
|
+
@check.vuln?.should be_false
|
23
|
+
end
|
24
|
+
|
25
|
+
it "is ignored if none of the prerequisites have been met" do
|
26
|
+
@check.options[:dependencies]=[{:name=>"puppet", :version=>'8.7.21'}]
|
27
|
+
@check.options[:detected_ruby] = {:engine=>"ruby", :version=>"1.8.7", :patchlevel=>"p342"}
|
28
|
+
# @check.dump_status
|
29
|
+
@check.vuln?.should be_false
|
30
|
+
end
|
31
|
+
end
|
@@ -0,0 +1,23 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-1756 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_1756.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "is reported when dragonfly version 0.9.12 is used" do
|
8
|
+
@check.dependencies = [{:name=>"dragonfly", :version=>'0.9.12'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "is reported when dragonfly version 0.8.12 is used" do
|
12
|
+
@check.dependencies = [{:name=>"dragonfly", :version=>'0.8.12'}]
|
13
|
+
@check.vuln?.should be_true
|
14
|
+
end
|
15
|
+
it "is reported when dragonfly version 0.7.12 is used" do
|
16
|
+
@check.dependencies = [{:name=>"dragonfly", :version=>'0.7.12'}]
|
17
|
+
@check.vuln?.should be_true
|
18
|
+
end
|
19
|
+
it "is not reported when dragonfly version 0.9.13 is used" do
|
20
|
+
@check.dependencies = [{:name=>"dragonfly", :version=>'0.9.13'}]
|
21
|
+
@check.vuln?.should be_false
|
22
|
+
end
|
23
|
+
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-2090 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_2090.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "fires when vulnerable cremefraiche version is used" do
|
8
|
+
@check.dependencies = [{:name=>"cremefraiche", :version=>'0.6.1'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "doesn't fire when not vulnerable cremefraiche version is used" do
|
12
|
+
@check.dependencies = [{:name=>"cremefraiche", :version=>'0.6.2'}]
|
13
|
+
@check.vuln?.should be_false
|
14
|
+
end
|
15
|
+
end
|
@@ -0,0 +1,11 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-2105 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_2105.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "is reported when show_in_browser vulnerable version is reported (0.0.3)" do
|
8
|
+
@check.dependencies = [{:name=>'show_in_browser', :version=>'0.0.3'}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
end
|
@@ -0,0 +1,27 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-2119 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_2119.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "fires when vulnerable passenger version is used" do
|
8
|
+
@check.dependencies = [{:name=>"passenger", :version=>"4.0.4"}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "fires when vulnerable passenger version is used" do
|
12
|
+
@check.dependencies = [{:name=>"passenger", :version=>"4.0.0"}]
|
13
|
+
@check.vuln?.should be_true
|
14
|
+
end
|
15
|
+
it "fires when vulnerable passenger version is used" do
|
16
|
+
@check.dependencies = [{:name=>"passenger", :version=>"3.0.20"}]
|
17
|
+
@check.vuln?.should be_true
|
18
|
+
end
|
19
|
+
it "doesn't fire when not vulnerable passenger version is used" do
|
20
|
+
@check.dependencies = [{:name=>"passenger", :version=>"4.0.5"}]
|
21
|
+
@check.vuln?.should be_false
|
22
|
+
end
|
23
|
+
it "doesn't fire when not vulnerable passenger version is used" do
|
24
|
+
@check.dependencies = [{:name=>"passenger", :version=>"3.0.21"}]
|
25
|
+
@check.vuln?.should be_false
|
26
|
+
end
|
27
|
+
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-2512 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_2512.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "is reported when a ftpd gem version 0.2.1 is detected" do
|
8
|
+
@check.dependencies = [{:name=>"ftpd", :version=>"0.2.1"}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "is not reported when a ftpd gem version 0.2.2 is detected" do
|
12
|
+
@check.dependencies = [{:name=>"ftpd", :version=>"0.2.2"}]
|
13
|
+
@check.vuln?.should be_false
|
14
|
+
end
|
15
|
+
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
describe "The CVE-2013-2513 vulnerability" do
|
3
|
+
before(:all) do
|
4
|
+
@check = Codesake::Dawn::Kb::CVE_2013_2513.new
|
5
|
+
# @check.debug = true
|
6
|
+
end
|
7
|
+
it "is reported when a flash_tool gem version 0.6.0 is detected" do
|
8
|
+
@check.dependencies = [{:name=>"flash_tool", :version=>"0.6.0"}]
|
9
|
+
@check.vuln?.should be_true
|
10
|
+
end
|
11
|
+
it "is not reported when a flash_tool gem version 0.6.1 is detected" do
|
12
|
+
@check.dependencies = [{:name=>"flash_tool", :version=>"0.6.1"}]
|
13
|
+
@check.vuln?.should be_false
|
14
|
+
end
|
15
|
+
end
|