dawnscanner 1.3.1 → 1.3.5

Sign up to get free protection for your applications and to get access to all the features.
Files changed (59) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data.tar.gz.sig +0 -0
  4. data/BUGS.md +14 -0
  5. data/Changelog.md +27 -1
  6. data/KnowledgeBase.md +19 -2
  7. data/LICENSE.txt +2 -2
  8. data/README.md +2 -2
  9. data/Rakefile +100 -0
  10. data/Roadmap.md +25 -11
  11. data/VERSION +16 -0
  12. data/bin/dawn +9 -5
  13. data/checksum/dawnscanner-1.3.1.gem.sha1 +1 -0
  14. data/dawnscanner.gemspec +5 -6
  15. data/lib/dawn/kb/basic_check.rb +25 -10
  16. data/lib/dawn/kb/cve_2004_0755.rb +3 -0
  17. data/lib/dawn/kb/cve_2004_0983.rb +3 -0
  18. data/lib/dawn/kb/cve_2005_1992.rb +3 -0
  19. data/lib/dawn/kb/cve_2005_2337.rb +3 -0
  20. data/lib/dawn/kb/cve_2006_3694.rb +2 -0
  21. data/lib/dawn/kb/cve_2007_0469.rb +2 -0
  22. data/lib/dawn/kb/cve_2007_5380.rb +2 -0
  23. data/lib/dawn/kb/cve_2007_6077.rb +2 -0
  24. data/lib/dawn/kb/cve_2007_6612.rb +2 -0
  25. data/lib/dawn/kb/cve_2013_6416.rb +1 -1
  26. data/lib/dawn/kb/cve_2015_1840/cve_2015_1840_a.rb +28 -0
  27. data/lib/dawn/kb/cve_2015_1840/cve_2015_1840_b.rb +28 -0
  28. data/lib/dawn/kb/cve_2015_2963.rb +27 -0
  29. data/lib/dawn/kb/cve_2015_3224.rb +26 -0
  30. data/lib/dawn/kb/cve_2015_3225.rb +28 -0
  31. data/lib/dawn/kb/cve_2015_3226.rb +27 -0
  32. data/lib/dawn/kb/cve_2015_3227.rb +27 -0
  33. data/lib/dawn/kb/osvdb_118579.rb +31 -0
  34. data/lib/dawn/kb/osvdb_118830.rb +32 -0
  35. data/lib/dawn/kb/osvdb_118954.rb +31 -0
  36. data/lib/dawn/kb/osvdb_119878.rb +32 -0
  37. data/lib/dawn/kb/osvdb_119927.rb +33 -0
  38. data/lib/dawn/kb/owasp_ror_cheatsheet/session_stored_in_database.rb +1 -1
  39. data/lib/dawn/knowledge_base.rb +34 -0
  40. data/lib/dawn/logger.rb +16 -0
  41. data/lib/dawn/reporter.rb +19 -19
  42. data/lib/dawn/utils.rb +2 -2
  43. data/lib/dawn/version.rb +5 -24
  44. data/lib/dawnscanner.rb +2 -1
  45. data/spec/lib/dawn/codesake_knowledgebase_spec.rb +66 -15
  46. data/spec/lib/kb/cve_2015_1840_spec.rb +35 -0
  47. data/spec/lib/kb/cve_2015_2963_spec.rb +17 -0
  48. data/spec/lib/kb/cve_2015_3224_spec.rb +16 -0
  49. data/spec/lib/kb/cve_2015_3225_spec.rb +23 -0
  50. data/spec/lib/kb/cve_2015_3226_spec.rb +29 -0
  51. data/spec/lib/kb/cve_2015_3227_spec.rb +23 -0
  52. data/spec/lib/kb/osvdb_118579_spec.rb +8 -0
  53. data/spec/lib/kb/osvdb_118830_spec.rb +16 -0
  54. data/spec/lib/kb/osvdb_118954_spec.rb +8 -0
  55. data/spec/lib/kb/osvdb_119878_spec.rb +17 -0
  56. data/spec/lib/kb/osvdb_119927_spec.rb +16 -0
  57. data/spec/spec_helper.rb +3 -2
  58. metadata +63 -21
  59. metadata.gz.sig +0 -0
@@ -11,6 +11,9 @@
11
11
  :name=>"CVE-2004-0755",
12
12
  :cvss=>"AV:L/AC:L/Au:N/C:P/I:N/A:N",
13
13
  :release_date => Date.new(2004, 10, 20),
14
+ :cve=>"2004-0755",
15
+ :severity=>:medium,
16
+ :priority=>:medium,
14
17
  :cwe=>"",
15
18
  :owasp=>"A9",
16
19
  :applies=>["rails", "sinatra", "padrino"],
@@ -10,6 +10,9 @@
10
10
  :name=>"CVE-2004-0983",
11
11
  :cvss=>"AV:N/AC:L/Au:N/C:N/I:N/A:P",
12
12
  :release_date => Date.new(2005, 03, 01),
13
+ :cve=>"2004-0983",
14
+ :severity=>:high,
15
+ :priority=>:high,
13
16
  :cwe=>"",
14
17
  :owasp=>"A9",
15
18
  :applies=>["rails", "sinatra", "padrino"],
@@ -11,6 +11,9 @@
11
11
  :name=>"CVE-2005-1992",
12
12
  :cvss=>"AV:N/AC:L/Au:N/C:P/I:P/A:P",
13
13
  :release_date => Date.new(2005, 06, 20),
14
+ :cve=>"CVE-2005-1992",
15
+ :priority=>:high,
16
+ :severity=>:high,
14
17
  :cwe=>"",
15
18
  :owasp=>"A9",
16
19
  :applies=>["rails", "sinatra", "padrino"],
@@ -10,6 +10,9 @@
10
10
  :name=>"CVE-2005-2337",
11
11
  :cvss=>"AV:N/AC:L/Au:N/C:P/I:P/A:P",
12
12
  :release_date => Date.new(2005, 10, 07),
13
+ :cve=>"CVE-2005-2337",
14
+ :severity=>:high,
15
+ :priority=>:high,
13
16
  :cwe=>"",
14
17
  :owasp=>"A9",
15
18
  :applies=>["rails", "sinatra", "padrino"],
@@ -11,6 +11,8 @@
11
11
  :cvss=>"AV:N/AC:L/Au:N/C:P/I:P/A:N",
12
12
  :release_date => Date.new(2006, 7, 21),
13
13
  :cwe=>"",
14
+ :severity=>:medium,
15
+ :priority=>:medium,
14
16
  :owasp=>"A9",
15
17
  :applies=>["rails", "sinatra", "padrino"],
16
18
  :kind=>Dawn::KnowledgeBase::RUBY_VERSION_CHECK,
@@ -11,6 +11,8 @@
11
11
  :cvss=>"AV:N/AC:M/Au:N/C:C/I:C/A:C",
12
12
  :release_date => Date.new(2007, 1, 24),
13
13
  :cwe=>"",
14
+ :severity=>:high,
15
+ :priority=>:high,
14
16
  :owasp=>"A9",
15
17
  :applies=>["rails", "sinatra", "padrino"],
16
18
  :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
@@ -11,6 +11,8 @@
11
11
  :cvss=>"AV:N/AC:M/Au:N/C:P/I:P/A:P",
12
12
  :release_date => Date.new(2007, 10, 19),
13
13
  :cwe=>"",
14
+ :severity=>:high,
15
+ :priority=>:high,
14
16
  :owasp=>"A9",
15
17
  :applies=>["rails"],
16
18
  :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
@@ -12,6 +12,8 @@
12
12
  :cvss=>"AV:N/AC:M/Au:N/C:P/I:P/A:P",
13
13
  :release_date => Date.new(2007, 11, 21),
14
14
  :cwe=>"362",
15
+ :severity=>:high,
16
+ :priority=>:high,
15
17
  :owasp=>"A9",
16
18
  :applies=>["rails"],
17
19
  :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
@@ -12,6 +12,8 @@
12
12
  :cvss=>"AV:N/AC:L/Au:N/C:P/I:P/A:N",
13
13
  :release_date => Date.new(2008, 3, 1),
14
14
  :cwe=>"",
15
+ :severity=>:high,
16
+ :priority=>:high,
15
17
  :owasp=>"A9",
16
18
  :applies=>["rails", "sinatra", "padrino"],
17
19
  :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
@@ -9,7 +9,7 @@
9
9
 
10
10
  super({
11
11
  :name=>"CVE-2013-6416",
12
- :cvss=>"AV:N/AC:M/Au:N/C:N/I:P/A:N) ",
12
+ :cvss=>"AV:N/AC:M/Au:N/C:N/I:P/A:N",
13
13
  :release_date => Date.new(2013, 12, 7),
14
14
  :cwe=>"79",
15
15
  :owasp=>"A9",
@@ -0,0 +1,28 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-07-29
4
+ class CVE_2015_1840_a
5
+ include DependencyCheck
6
+
7
+ def initialize
8
+ message = "jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value."
9
+
10
+ super({
11
+ :name=>"CVE-2015-1849",
12
+ :cvss=>"AV:N/AC:L/Au:N/C:P/I:N/A:N",
13
+ :release_date => Date.new(2015, 7, 26),
14
+ :cwe=>"200",
15
+ :owasp=>"A8",
16
+ :applies=>["rails"],
17
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
18
+ :message=>message,
19
+ :mitigation=>"Please upgrade jquery-ujs and jquery-rails gems to latest version.",
20
+ :aux_links=>["https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md", "https://github.com/rails/jquery-ujs/blob/master/CHANGELOG.md"]
21
+ })
22
+
23
+ self.safe_dependencies = [{:name=>"jquery-rails", :version=>['4.0.2', '3.1.3']}]
24
+
25
+ end
26
+ end
27
+ end
28
+ end
@@ -0,0 +1,28 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-07-29
4
+ class CVE_2015_1840_b
5
+ include DependencyCheck
6
+
7
+ def initialize
8
+ message = "jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value."
9
+
10
+ super({
11
+ :name=>"CVE-2015-1849",
12
+ :cvss=>"AV:N/AC:L/Au:N/C:P/I:N/A:N",
13
+ :release_date => Date.new(2015, 7, 26),
14
+ :cwe=>"200",
15
+ :owasp=>"A8",
16
+ :applies=>["rails"],
17
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
18
+ :message=>message,
19
+ :mitigation=>"Please upgrade jquery-ujs and jquery-rails gems to latest version.",
20
+ :aux_links=>["https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md", "https://github.com/rails/jquery-ujs/blob/master/CHANGELOG.md"]
21
+ })
22
+
23
+ self.safe_dependencies = [{:name=>"jquery-ujs", :version=>['1.0.4']}]
24
+
25
+ end
26
+ end
27
+ end
28
+ end
@@ -0,0 +1,27 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-07-29
4
+ class CVE_2015_2963
5
+ include DependencyCheck
6
+
7
+ def initialize
8
+ message = "The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg."
9
+ super({
10
+ :name=>"CVE-2015-2963",
11
+ :cvss=>"AV:N/AC:M/Au:N/C:N/I:P/A:N",
12
+ :release_date => Date.new(2015, 7, 10),
13
+ :cwe=>"79",
14
+ :owasp=>"A1",
15
+ :applies=>["sinatra", "padrino", "rails"],
16
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
17
+ :message=>message,
18
+ :mitigation=>"Please upgrade paperclip gem to latest version.",
19
+ :aux_links=>["https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57","https://robots.thoughtbot.com/paperclip-security-release"]
20
+ })
21
+
22
+ self.safe_dependencies = [{:name=>"paperclip", :version=>['4.2.2']}]
23
+
24
+ end
25
+ end
26
+ end
27
+ end
@@ -0,0 +1,26 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-07-29
4
+ class CVE_2015_3224
5
+ include DependencyCheck
6
+
7
+ def initialize
8
+ message = "request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request."
9
+ super({
10
+ :name=>"CVE-2015-3224",
11
+ :cvss=>"AV:N/AC:M/Au:N/C:N/I:P/A:N",
12
+ :release_date => Date.new(2015, 7, 26),
13
+ :cwe=>"284",
14
+ :owasp=>"A9",
15
+ :applies=>["rails"],
16
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
17
+ :message=>message,
18
+ :mitigation=>"Please upgrade web-console gem to latest version.",
19
+ :aux_links=>["https://groups.google.com/forum/message/raw?msg=rubyonrails-security/lzmz9_ijUFw/HBMPi4zp5NAJ"]
20
+ })
21
+
22
+ self.safe_dependencies = [{:name=>"web-console", :version=>['2.1.3']}]
23
+ end
24
+ end
25
+ end
26
+ end
@@ -0,0 +1,28 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-07-29
4
+ class CVE_2015_3225
5
+ include DependencyCheck
6
+
7
+ def initialize
8
+ message = "lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth."
9
+
10
+ super({
11
+ :name=>"CVE-2015-3225",
12
+ :cvss=>"AV:N/AC:L/Au:N/C:N/I:N/A:P",
13
+ :release_date => Date.new(2015, 7, 26),
14
+ :cwe=>"",
15
+ :owasp=>"A9",
16
+ :applies=>["sinatra", "padrino", "rails"],
17
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
18
+ :message=>message,
19
+ :mitigation=>"Please upgrade rack gem to latest version or at least 1.5.4 or 1.6.2.",
20
+ :aux_links=>["https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ"]
21
+ })
22
+
23
+ self.safe_dependencies = [{:name=>"rack", :version=>['1.5.4', '1.6.2']}]
24
+
25
+ end
26
+ end
27
+ end
28
+ end
@@ -0,0 +1,27 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-07-29
4
+ class CVE_2015_3226
5
+ include DependencyCheck
6
+
7
+ def initialize
8
+ message = "Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding."
9
+ super({
10
+ :name=>"CVE-2015-3226",
11
+ :cvss=>"AV:N/AC:M/Au:N/C:N/I:P/A:N",
12
+ :release_date => Date.new(2015, 7, 26),
13
+ :cwe=>"79",
14
+ :owasp=>"A3",
15
+ :applies=>["sinatra", "padrino", "rails"],
16
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
17
+ :message=>message,
18
+ :mitigation=>"Please upgrade activesupport gem to latest version or at least 4.1.12 or 4.2.3. This is automatically done by upgrading your Rails environment if you are using it.",
19
+ :aux_links=>["https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ"]
20
+ })
21
+
22
+ self.safe_dependencies = [{:name=>"activesupport", :version=>['4.1.12', '4.2.3', '3.99.99']}]
23
+
24
+ end
25
+ end
26
+ end
27
+ end
@@ -0,0 +1,27 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-07-29
4
+ class CVE_2015_3227
5
+ include DependencyCheck
6
+
7
+ def initialize
8
+ message = "The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth."
9
+
10
+ super({
11
+ :name=>"CVE-2015-3227",
12
+ :cvss=>"AV:N/AC:L/Au:N/C:N/I:N/A:P",
13
+ :release_date => Date.new(2015, 7, 26),
14
+ :cwe=>"",
15
+ :owasp=>"A9",
16
+ :applies=>["sinatra", "padrino", "rails"],
17
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
18
+ :message=>message,
19
+ :mitigation=>"Please upgrade activesupport gem to latest version or at least 4.1.12 or 4.2.3. This is automatically done by upgrading your Rails environment if you are using it.",
20
+ :aux_links=>["https://groups.google.com/forum/message/raw?msg=rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J"]
21
+ })
22
+
23
+ self.safe_dependencies = [{:name=>"activesupport", :version=>['4.1.12', '4.2.3']}]
24
+ end
25
+ end
26
+ end
27
+ end
@@ -0,0 +1,31 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-04-04
4
+ class OSVDB_118579
5
+ # Include the testing skeleton for this Security Check
6
+ # include PatternMatchCheck
7
+ include DependencyCheck
8
+ # include RubyVersionCheck
9
+
10
+ def initialize
11
+ message = "xaviershay-dm-rails Gem for Ruby contains a flaw in the execute() function in /datamapper/dm-rails/blob/master/lib/dm-rails/storage.rb. The issue is due to the function exposing sensitive information via the process table. This may allow a local attack to gain access to MySQL credential information."
12
+ super({
13
+ :name=> "OSVDB_118579",
14
+ :cve=>"2015-2179",
15
+ :osvdb=>"118579",
16
+ :cvss=>"",
17
+ :release_date => Date.new(2015, 2, 17),
18
+ :cwe=>"",
19
+ :owasp=>"A9",
20
+ :applies=>["rails"],
21
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
22
+ :message=>message,
23
+ :mitigation=>"We are not currently aware of a solution for this vulnerability (4 April 2015)",
24
+ :aux_links=>[""]
25
+ })
26
+ self.safe_dependencies = [{:name=>"xaviershay-dm-rails", :version=>['0.8.0']}]
27
+
28
+ end
29
+ end
30
+ end
31
+ end
@@ -0,0 +1,32 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-04-05
4
+ class OSVDB_118830
5
+ # Include the testing skeleton for this Security Check
6
+ # include PatternMatchCheck
7
+ include DependencyCheck
8
+ # include RubyVersionCheck
9
+
10
+ def initialize
11
+ message = "Doorkeeper Gem for Ruby contains a flaw in lib/doorkeeper/engine.rb. The issue is due to the program storing sensitive information in production logs. This may allow a local attacker to gain access to sensitive information."
12
+ super({
13
+ :name=> "OSVDB_118830",
14
+ :cve=>"",
15
+ :osvdb=>"118830",
16
+ :cvss=>"",
17
+ :release_date => Date.new(2015, 2, 10),
18
+ :cwe=>"",
19
+ :owasp=>"A6",
20
+ :applies=>["rails", "sinatra", "padrino"],
21
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
22
+ :message=>message,
23
+ :mitigation=>"Please upgrade doorkeeper gem version at least to 2.1.2. As a general rule, using the latest stable version is recommended.",
24
+ :aux_links=>[""]
25
+ })
26
+ self.safe_dependencies = [{:name=>"doorkeeper", :version=>['2.1.2']}]
27
+
28
+
29
+ end
30
+ end
31
+ end
32
+ end
@@ -0,0 +1,31 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-04-04
4
+ class OSVDB_118954
5
+ # Include the testing skeleton for this Security Check
6
+ # include PatternMatchCheck
7
+ include DependencyCheck
8
+ # include RubyVersionCheck
9
+
10
+ def initialize
11
+ message = "Ruby on Rails contains a flaw that is triggered when handling a to_json call to ActiveModel::Name, which can cause an infinite loop. This may allow a remote attacker to cause a denial of service."
12
+ super({
13
+ :name=> "OSVDB_118954",
14
+ :cve=>"",
15
+ :osvdb=>"118954",
16
+ :cvss=>"",
17
+ :release_date => Date.new(2015, 2, 28),
18
+ :cwe=>"",
19
+ :owasp=>"A9",
20
+ :applies=>["rails"],
21
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
22
+ :message=>message,
23
+ :mitigation=>"Currently, there are no known workarounds or upgrades to correct this issue. However, a patch has been committed to the source code repository (e.g. GIT, CVS, SVN) that addresses this vulnerability. Until it is incorporated into the next release of the software, manually patching an existing installation is the only known available solution. Check the vendor links in the references section for more information.",
24
+ :aux_links=>[""]
25
+ })
26
+ self.safe_dependencies = [{:name=>"rails", :version=>['99.99.99']}]
27
+
28
+ end
29
+ end
30
+ end
31
+ end
@@ -0,0 +1,32 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-04-04
4
+ class OSVDB_119878
5
+ # Include the testing skeleton for this Security Check
6
+ # include PatternMatchCheck
7
+ include DependencyCheck
8
+ # include RubyVersionCheck
9
+
10
+ def initialize
11
+ message="rest-client Gem for Ruby contains a flaw in abstract_response.rb related to the handling of set-cookie headers in redirection responses that allows a remote, user-assisted attacker to conduct a session fixation attack. This flaw exists because the application, when establishing a new session, does not invalidate an existing session identifier and assign a new one. With a specially crafted request fixating the session identifier, a context-dependent attacker can ensure a user authenticates with the known session identifier, allowing the session to be subsequently hijacked."
12
+
13
+ super({
14
+ :name=> "OSVDB_119878",
15
+ :cve=>"2015-1820",
16
+ :osvdb=>"119878",
17
+ :cvss=>"",
18
+ :release_date => Date.new(2015, 3, 24),
19
+ :cwe=>"",
20
+ :owasp=>"A9",
21
+ :applies=>["rails", "sinatra", "padrino"],
22
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
23
+ :message=>message,
24
+ :mitigation=>"The vulnerability at the 4 April 2015 it has not been fixed. Please refer to gem readme to check when vulnerability it has been fixed.",
25
+ :aux_links=>[""]
26
+ })
27
+ self.safe_dependencies = [{:name=>"rest-client", :version=>['99.99.99']}]
28
+
29
+ end
30
+ end
31
+ end
32
+ end
@@ -0,0 +1,33 @@
1
+ module Dawn
2
+ module Kb
3
+ # Automatically created with rake on 2015-03-27
4
+ class OSVDB_119927
5
+ # Include the testing skeleton for this Security Check
6
+ # include PatternMatchCheck
7
+ include DependencyCheck
8
+ # include RubyVersionCheck
9
+
10
+ def initialize
11
+ message = "http Gem for Ruby contains a flaw related to certificate validation. The issue is due to a failure to call the OpenSSL::SSL::SSLSocket#post_connection_check method, leading to hostnames not being properly verified. By spoofing the TLS/SSL server via a certificate that appears valid, an attacker with the ability to intercept network traffic (e.g. MiTM, DNS cache poisoning) can disclose and optionally manipulate transmitted data."
12
+
13
+ super({
14
+ :name=> "OSVDB_119927",
15
+ :cve=>"2015-1828",
16
+ :osvdb=>"119927",
17
+ :cvss=>"",
18
+ :release_date => Date.new(2015, 3, 25),
19
+ :cwe=>"",
20
+ :owasp=>"A9",
21
+ :applies=>["rails", "sinatra", "padrino"],
22
+ :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK,
23
+ :message=>message,
24
+ :mitigation=>"Please upgrade http gem version at least to 0.8.0. As a general rule, using the latest stable version is recommended.",
25
+ :aux_links=>[""]
26
+ })
27
+ self.safe_dependencies = [{:name=>"http", :version=>['0.8.0']}]
28
+
29
+
30
+ end
31
+ end
32
+ end
33
+ end