dawnscanner 1.6.1 → 1.6.2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (124) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data.tar.gz.sig +0 -0
  4. data/.ruby-version +1 -1
  5. data/.travis.yml +2 -0
  6. data/Changelog.md +10 -1
  7. data/KnowledgeBase.md +10 -4
  8. data/README.md +1 -1
  9. data/Rakefile +12 -8
  10. data/VERSION +1 -1
  11. data/checksum/dawnscanner-1.6.1.gem.sha1 +1 -0
  12. data/lib/dawn/kb/cve_2016_2097.rb +35 -0
  13. data/lib/dawn/kb/cve_2016_2098.rb +34 -0
  14. data/lib/dawn/knowledge_base.rb +4 -0
  15. data/lib/dawn/version.rb +4 -4
  16. data/spec/lib/dawn/codesake_core_spec.rb +1 -1
  17. data/spec/lib/dawn/codesake_knowledgebase_spec.rb +451 -441
  18. data/spec/lib/dawn/codesake_padrino_engine_disabled.rb +11 -11
  19. data/spec/lib/dawn/codesake_rails_engine_disabled.rb +2 -2
  20. data/spec/lib/dawn/codesake_sinatra_engine_disabled.rb +36 -36
  21. data/spec/lib/kb/codesake_cve_2013_0175_spec.rb +6 -6
  22. data/spec/lib/kb/codesake_cve_2013_4457_spec.rb +7 -7
  23. data/spec/lib/kb/codesake_dependency_version_check_spec.rb +10 -10
  24. data/spec/lib/kb/codesake_deprecation_check_spec.rb +11 -11
  25. data/spec/lib/kb/codesake_ruby_version_check_spec.rb +4 -4
  26. data/spec/lib/kb/codesake_version_check_spec.rb +42 -42
  27. data/spec/lib/kb/cve_2011_2705_spec.rb +7 -7
  28. data/spec/lib/kb/cve_2011_2930_spec.rb +6 -6
  29. data/spec/lib/kb/cve_2011_3009_spec.rb +4 -4
  30. data/spec/lib/kb/cve_2011_3187_spec.rb +4 -4
  31. data/spec/lib/kb/cve_2011_4319_spec.rb +9 -9
  32. data/spec/lib/kb/cve_2011_5036_spec.rb +21 -21
  33. data/spec/lib/kb/cve_2012_1098_spec.rb +7 -7
  34. data/spec/lib/kb/cve_2012_2139_spec.rb +3 -3
  35. data/spec/lib/kb/cve_2012_2671_spec.rb +4 -4
  36. data/spec/lib/kb/cve_2012_6109_spec.rb +25 -25
  37. data/spec/lib/kb/cve_2012_6684_spec.rb +2 -2
  38. data/spec/lib/kb/cve_2013_0162_spec.rb +4 -4
  39. data/spec/lib/kb/cve_2013_0183_spec.rb +11 -11
  40. data/spec/lib/kb/cve_2013_0184_spec.rb +26 -26
  41. data/spec/lib/kb/cve_2013_0256_spec.rb +6 -6
  42. data/spec/lib/kb/cve_2013_0262_spec.rb +9 -9
  43. data/spec/lib/kb/cve_2013_0263_spec.rb +1 -1
  44. data/spec/lib/kb/cve_2013_1607_spec.rb +2 -2
  45. data/spec/lib/kb/cve_2013_1655_spec.rb +4 -4
  46. data/spec/lib/kb/cve_2013_1756_spec.rb +4 -4
  47. data/spec/lib/kb/cve_2013_2090_spec.rb +2 -2
  48. data/spec/lib/kb/cve_2013_2105_spec.rb +1 -1
  49. data/spec/lib/kb/cve_2013_2119_spec.rb +5 -5
  50. data/spec/lib/kb/cve_2013_2512_spec.rb +2 -2
  51. data/spec/lib/kb/cve_2013_2513_spec.rb +2 -2
  52. data/spec/lib/kb/cve_2013_2516_spec.rb +2 -2
  53. data/spec/lib/kb/cve_2013_4203_spec.rb +2 -2
  54. data/spec/lib/kb/cve_2013_4413_spec.rb +2 -2
  55. data/spec/lib/kb/cve_2013_4489_spec.rb +11 -11
  56. data/spec/lib/kb/cve_2013_4491_spec.rb +2 -2
  57. data/spec/lib/kb/cve_2013_4593_spec.rb +2 -2
  58. data/spec/lib/kb/cve_2013_5647_spec.rb +3 -3
  59. data/spec/lib/kb/cve_2013_5671_spec.rb +4 -4
  60. data/spec/lib/kb/cve_2013_6416_spec.rb +5 -5
  61. data/spec/lib/kb/cve_2013_6459_spec.rb +2 -2
  62. data/spec/lib/kb/cve_2013_7086_spec.rb +3 -3
  63. data/spec/lib/kb/cve_2014_0036_spec.rb +2 -2
  64. data/spec/lib/kb/cve_2014_0080_spec.rb +5 -5
  65. data/spec/lib/kb/cve_2014_0081_spec.rb +10 -10
  66. data/spec/lib/kb/cve_2014_0082_spec.rb +8 -8
  67. data/spec/lib/kb/cve_2014_0130_spec.rb +3 -3
  68. data/spec/lib/kb/cve_2014_1233_spec.rb +2 -2
  69. data/spec/lib/kb/cve_2014_1234_spec.rb +2 -2
  70. data/spec/lib/kb/cve_2014_2322_spec.rb +2 -2
  71. data/spec/lib/kb/cve_2014_2538_spec.rb +2 -2
  72. data/spec/lib/kb/cve_2014_3482_spec.rb +2 -2
  73. data/spec/lib/kb/cve_2014_3483_spec.rb +5 -5
  74. data/spec/lib/kb/cve_2014_7818_spec.rb +8 -8
  75. data/spec/lib/kb/cve_2014_7819_spec.rb +32 -32
  76. data/spec/lib/kb/cve_2014_7829_spec.rb +10 -10
  77. data/spec/lib/kb/cve_2014_9490_spec.rb +2 -2
  78. data/spec/lib/kb/cve_2015_1819_spec.rb +2 -2
  79. data/spec/lib/kb/cve_2015_1840_spec.rb +7 -7
  80. data/spec/lib/kb/cve_2015_2963_spec.rb +2 -2
  81. data/spec/lib/kb/cve_2015_3224_spec.rb +2 -2
  82. data/spec/lib/kb/cve_2015_3225_spec.rb +5 -5
  83. data/spec/lib/kb/cve_2015_3226_spec.rb +6 -6
  84. data/spec/lib/kb/cve_2015_3227_spec.rb +5 -5
  85. data/spec/lib/kb/cve_2015_3448_spec.rb +2 -2
  86. data/spec/lib/kb/cve_2015_4020_spec.rb +4 -4
  87. data/spec/lib/kb/cve_2015_5312_spec.rb +6 -6
  88. data/spec/lib/kb/cve_2015_7497_spec.rb +6 -6
  89. data/spec/lib/kb/cve_2015_7498_spec.rb +6 -6
  90. data/spec/lib/kb/cve_2015_7499_spec.rb +6 -6
  91. data/spec/lib/kb/cve_2015_7500_spec.rb +6 -6
  92. data/spec/lib/kb/cve_2015_7519_spec.rb +4 -4
  93. data/spec/lib/kb/cve_2015_7541_spec.rb +2 -2
  94. data/spec/lib/kb/cve_2015_7576_spec.rb +11 -11
  95. data/spec/lib/kb/cve_2015_7577_spec.rb +11 -11
  96. data/spec/lib/kb/cve_2015_7578_spec.rb +2 -2
  97. data/spec/lib/kb/cve_2015_7579_spec.rb +4 -4
  98. data/spec/lib/kb/cve_2015_7581_spec.rb +11 -11
  99. data/spec/lib/kb/cve_2015_8241_spec.rb +6 -6
  100. data/spec/lib/kb/cve_2015_8242_spec.rb +6 -6
  101. data/spec/lib/kb/cve_2015_8317_spec.rb +6 -6
  102. data/spec/lib/kb/cve_2016_0751_spec.rb +11 -11
  103. data/spec/lib/kb/cve_2016_0752_spec.rb +11 -11
  104. data/spec/lib/kb/cve_2016_0753_spec.rb +11 -11
  105. data/spec/lib/kb/cve_2016_2097_spec.rb +35 -0
  106. data/spec/lib/kb/cve_2016_2098_spec.rb +39 -0
  107. data/spec/lib/kb/osvdb_105971_spec.rb +2 -2
  108. data/spec/lib/kb/osvdb_108530_spec.rb +3 -3
  109. data/spec/lib/kb/osvdb_108563_spec.rb +2 -2
  110. data/spec/lib/kb/osvdb_108569_spec.rb +2 -2
  111. data/spec/lib/kb/osvdb_108570_spec.rb +2 -2
  112. data/spec/lib/kb/osvdb_115654_spec.rb +2 -2
  113. data/spec/lib/kb/osvdb_116010_spec.rb +2 -2
  114. data/spec/lib/kb/osvdb_117903_spec.rb +4 -4
  115. data/spec/lib/kb/osvdb_118830_spec.rb +2 -2
  116. data/spec/lib/kb/osvdb_118954_spec.rb +3 -3
  117. data/spec/lib/kb/osvdb_119878_spec.rb +21 -21
  118. data/spec/lib/kb/osvdb_119927_spec.rb +2 -2
  119. data/spec/lib/kb/osvdb_120415_spec.rb +2 -2
  120. data/spec/lib/kb/osvdb_120857_spec.rb +6 -6
  121. data/spec/lib/kb/osvdb_121701_spec.rb +2 -2
  122. data/spec/lib/kb/owasp_ror_cheatsheet_disabled.rb +10 -10
  123. metadata +9 -2
  124. metadata.gz.sig +0 -0
@@ -6,10 +6,10 @@ describe "The CVE-2013-2513 vulnerability" do
6
6
  end
7
7
  it "is reported when a flash_tool gem version 0.6.0 is detected" do
8
8
  @check.dependencies = [{:name=>"flash_tool", :version=>"0.6.0"}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
  it "is not reported when a flash_tool gem version 0.6.1 is detected" do
12
12
  @check.dependencies = [{:name=>"flash_tool", :version=>"0.6.1"}]
13
- @check.vuln?.should == false
13
+ expect(@check.vuln?).to eq(false)
14
14
  end
15
15
  end
@@ -6,10 +6,10 @@ describe "The CVE-2013-2516 vulnerability" do
6
6
  end
7
7
  it "is reported when a fileutils gem version 0.7 is detected" do
8
8
  @check.dependencies = [{:name=>"fileutils", :version=>"0.7"}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
  it "is not reported when a fileutils gem version 0.8 is detected" do
12
12
  @check.dependencies = [{:name=>"fileutils", :version=>"0.8"}]
13
- @check.vuln?.should == false
13
+ expect(@check.vuln?).to eq(false)
14
14
  end
15
15
  end
@@ -6,10 +6,10 @@ describe "The CVE-2013-4203 vulnerability" do
6
6
  end
7
7
  it "is reported when a vulnerable rgpg version is detected (0.2.2)" do
8
8
  @check.dependencies = [{:name=>"rgpg", :version=>"0.2.2"}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
  it "is not reported when a safe rgpg version is detected (0.2.3)" do
12
12
  @check.dependencies = [{:name=>"rgpg", :version=>"0.2.3"}]
13
- @check.vuln?.should == false
13
+ expect(@check.vuln?).to eq(false)
14
14
  end
15
15
  end
@@ -7,10 +7,10 @@ describe "The CVE-2013-4413 vulnerability" do
7
7
 
8
8
  it "is reported when the vulnerable gem is detected" do
9
9
  @check.dependencies = [{:name=>"wicked", :version=>"1.0.0"}]
10
- @check.vuln?.should == true
10
+ expect(@check.vuln?).to eq(true)
11
11
  end
12
12
  it "is not reported when a fixed release is detected" do
13
13
  @check.dependencies = [{:name=>"wicked", :version=>"1.0.1"}]
14
- @check.vuln?.should == false
14
+ expect(@check.vuln?).to eq(false)
15
15
  end
16
16
  end
@@ -8,56 +8,56 @@ describe "The CVE-2013-4489 vulnerability" do
8
8
 
9
9
  it "is reported when the vulnerable gem is detected" do
10
10
  @check.dependencies = [{:name=>"grit", :version=>"5.2"}]
11
- @check.vuln?.should == true
11
+ expect(@check.vuln?).to eq(true)
12
12
  end
13
13
 
14
14
  it "is reported when the vulnerable gem is detected" do
15
15
  @check.dependencies = [{:name=>"grit", :version=>"5.3"}]
16
- @check.vuln?.should == true
16
+ expect(@check.vuln?).to eq(true)
17
17
  end
18
18
 
19
19
  it "is reported when the vulnerable gem is detected" do
20
20
  @check.dependencies = [{:name=>"grit", :version=>"5.4"}]
21
- @check.vuln?.should == true
21
+ expect(@check.vuln?).to eq(true)
22
22
  end
23
23
 
24
24
  it "is reported when the vulnerable gem is detected" do
25
25
  @check.dependencies = [{:name=>"grit", :version=>"6.0"}]
26
- @check.vuln?.should == true
26
+ expect(@check.vuln?).to eq(true)
27
27
  end
28
28
 
29
29
  it "is reported when the vulnerable gem is detected" do
30
30
  @check.dependencies = [{:name=>"grit", :version=>"6.1"}]
31
- @check.vuln?.should == true
31
+ expect(@check.vuln?).to eq(true)
32
32
  end
33
33
 
34
34
  it "is reported when the vulnerable gem is detected" do
35
35
  @check.dependencies = [{:name=>"grit", :version=>"6.2"}]
36
- @check.vuln?.should == true
36
+ expect(@check.vuln?).to eq(true)
37
37
  end
38
38
 
39
39
  it "is not reported when a fixed release is detected" do
40
40
  @check.dependencies = [{:name=>"grit", :version=>"5.1"}]
41
- @check.vuln?.should == false
41
+ expect(@check.vuln?).to eq(false)
42
42
  end
43
43
 
44
44
  it "is not reported when a fixed release is detected" do
45
45
  @check.dependencies = [{:name=>"grit", :version=>"5.0"}]
46
- @check.vuln?.should == false
46
+ expect(@check.vuln?).to eq(false)
47
47
  end
48
48
 
49
49
  it "is not reported when a fixed release is detected" do
50
50
  @check.dependencies = [{:name=>"grit", :version=>"3.2"}]
51
- @check.vuln?.should == false
51
+ expect(@check.vuln?).to eq(false)
52
52
  end
53
53
 
54
54
  it "is not reported when a fixed release is detected" do
55
55
  @check.dependencies = [{:name=>"grit", :version=>"5.4.1"}]
56
- @check.vuln?.should == false
56
+ expect(@check.vuln?).to eq(false)
57
57
  end
58
58
 
59
59
  it "is not reported when a fixed release is detected" do
60
60
  @check.dependencies = [{:name=>"grit", :version=>"6.2.3"}]
61
- @check.vuln?.should == false
61
+ expect(@check.vuln?).to eq(false)
62
62
  end
63
63
  end
@@ -7,10 +7,10 @@ describe "The CVE-2013-4491 vulnerability" do
7
7
 
8
8
  it "is reported when the vulnerable gem is detected" do
9
9
  @check.dependencies = [{:name=>"rails", :version=>"3.2.15"}]
10
- @check.vuln?.should == true
10
+ expect(@check.vuln?).to eq(true)
11
11
  end
12
12
  it "is not reported when a fixed release is detected" do
13
13
  @check.dependencies = [{:name=>"rails", :version=>"3.2.22"}]
14
- @check.vuln?.should == false
14
+ expect(@check.vuln?).to eq(false)
15
15
  end
16
16
  end
@@ -7,10 +7,10 @@ describe "The CVE-2013-4593 vulnerability" do
7
7
 
8
8
  it "is reported when a omniauth-facebook gem version 1.5.0 is detected" do
9
9
  @check.dependencies = [{:name=>"omniauth-facebook", :version=>"1.5.0"}]
10
- @check.vuln?.should == true
10
+ expect(@check.vuln?).to eq(true)
11
11
  end
12
12
  it "is not reported when a omniauth-facebook gem version 1.5.1 is detected" do
13
13
  @check.dependencies = [{:name=>"omniauth-facebook", :version=>"1.5.1"}]
14
- @check.vuln?.should == false
14
+ expect(@check.vuln?).to eq(false)
15
15
  end
16
16
  end
@@ -6,14 +6,14 @@ describe "The CVE-2013-5647 vulnerability" do
6
6
  end
7
7
  it "fires when vulnerable sounder 1.0.1 version is userd" do
8
8
  @check.dependencies = [{:name=>"sounder", :version=>'1.0.1'}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
  it "doesn't fire when sounder not vulnerable version is used" do
12
12
  @check.dependencies = [{:name=>"sounder", :version=>'1.0.2'}]
13
- @check.vuln?.should == false
13
+ expect(@check.vuln?).to eq(false)
14
14
  end
15
15
  it "doesn't fire when a very old sounder version is used" do
16
16
  @check.dependencies = [{:name=>"sounder", :version=>'0.9.2'}]
17
- @check.vuln?.should == false
17
+ expect(@check.vuln?).to eq(false)
18
18
  end
19
19
  end
@@ -7,21 +7,21 @@ describe "The CVE-2013-5671 vulnerability" do
7
7
 
8
8
  it "is reported when a fog-dragonfly gem version 0.8.2 is detected" do
9
9
  @check.dependencies = [{:name=>"fog-dragonfly", :version=>"0.8.2"}]
10
- @check.vuln?.should == true
10
+ expect(@check.vuln?).to eq(true)
11
11
  end
12
12
 
13
13
  it "is reported when a fog-dragonfly gem version 0.8.0 is detected" do
14
14
  @check.dependencies = [{:name=>"fog-dragonfly", :version=>"0.8.0"}]
15
- @check.vuln?.should == true
15
+ expect(@check.vuln?).to eq(true)
16
16
  end
17
17
 
18
18
  it "is reported when a fog-dragonfly gem version 0.7.5 is detected" do
19
19
  @check.dependencies = [{:name=>"fog-dragonfly", :version=>"0.7.5"}]
20
- @check.vuln?.should == true
20
+ expect(@check.vuln?).to eq(true)
21
21
  end
22
22
 
23
23
  it "is not reported when a paratrooper-pingdom gem version 0.8.3 is detected" do
24
24
  @check.dependencies = [{:name=>"fog-dragonfly", :version=>"0.8.3"}]
25
- @check.vuln?.should == false
25
+ expect(@check.vuln?).to eq(false)
26
26
  end
27
27
  end
@@ -7,24 +7,24 @@ describe "The CVE-2013-6416 vulnerability" do
7
7
  end
8
8
  it "is detected if vulnerable version of rails rubygem is detected" do
9
9
  @check.dependencies=[{:name=>"rails", :version=>'4.0.1'}]
10
- @check.vuln?.should == true
10
+ expect(@check.vuln?).to eq(true)
11
11
  end
12
12
  it "is ignored if rails version is 3.2.x" do
13
13
  @check.dependencies=[{:name=>"rails", :version=>'3.2.16'}]
14
- @check.vuln?.should == false
14
+ expect(@check.vuln?).to eq(false)
15
15
  end
16
16
 
17
17
  it "is ignored if rails version is 3.1.x" do
18
18
  @check.dependencies=[{:name=>"rails", :version=>'3.1.16'}]
19
- @check.vuln?.should == false
19
+ expect(@check.vuln?).to eq(false)
20
20
  end
21
21
  it "is ignored if rails version is 3.0.x" do
22
22
  @check.dependencies=[{:name=>"rails", :version=>'3.0.16'}]
23
- @check.vuln?.should == false
23
+ expect(@check.vuln?).to eq(false)
24
24
  end
25
25
  it "is ignored if rails version is 2.3.x" do
26
26
  @check.dependencies=[{:name=>"rails", :version=>'2.3.16'}]
27
- @check.vuln?.should == false
27
+ expect(@check.vuln?).to eq(false)
28
28
  end
29
29
 
30
30
 
@@ -6,10 +6,10 @@ describe "The CVE-2013-6459 vulnerability" do
6
6
  end
7
7
  it "fires when will_paginage 3.0.4 vulnerable version is used" do
8
8
  @check.dependencies = [{:name=>"will_paginate", :version=>'3.0.4'}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
  it "doesn't fires when will_paginage 3.0.5 safe version is used" do
12
12
  @check.dependencies = [{:name=>"will_paginate", :version=>'3.0.5'}]
13
- @check.vuln?.should == false
13
+ expect(@check.vuln?).to eq(false)
14
14
  end
15
15
  end
@@ -6,17 +6,17 @@ describe "The CVE-2013-7086 vulnerability" do
6
6
  end
7
7
  it "is detected for gem 1.0.5.3" do
8
8
  @check.dependencies = [{:name=>"webbynode", :version=>'1.0.5.3'}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
 
12
12
  it "is detected for gem 1.0.4.3" do
13
13
  @check.dependencies = [{:name=>"webbynode", :version=>'1.0.4.3'}]
14
- @check.vuln?.should == true
14
+ expect(@check.vuln?).to eq(true)
15
15
  end
16
16
 
17
17
  it "is not detected for gem 1.0.5.4" do
18
18
  @check.dependencies = [{:name=>"webbynode", :version=>'1.0.5.4'}]
19
- @check.vuln?.should == false
19
+ expect(@check.vuln?).to eq(false)
20
20
  end
21
21
 
22
22
  end
@@ -6,10 +6,10 @@ describe "The CVE-2014-0036 vulnerability" do
6
6
  end
7
7
  it "is reported when a vulnerable rbovirt gem version is detected (0.0.23)" do
8
8
  @check.dependencies = [{:name=>"rbovirt", :version=>'0.0.23'}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
  it "is not reported when a sage rbovirt gem version is detected (0.0.24)" do
12
12
  @check.dependencies = [{:name=>"rbovirt", :version=>'0.0.24'}]
13
- @check.vuln?.should == false
13
+ expect(@check.vuln?).to eq(false)
14
14
  end
15
15
  end
@@ -6,23 +6,23 @@ describe "The CVE-2014-0080 vulnerability" do
6
6
  end
7
7
  it "affects version 4.0.0" do
8
8
  @check.dependencies = [{:name=>"rails", :version=>'4.0.0'}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
  it "affects version 4.0.2" do
12
12
  @check.dependencies = [{:name=>"rails", :version=>'4.0.2'}]
13
- @check.vuln?.should == true
13
+ expect(@check.vuln?).to eq(true)
14
14
  end
15
15
  it "affects version 4.0.1" do
16
16
  @check.dependencies = [{:name=>"rails", :version=>'4.0.1'}]
17
- @check.vuln?.should == true
17
+ expect(@check.vuln?).to eq(true)
18
18
  end
19
19
  it "affects version 4.1.0.beta1" do
20
20
  @check.dependencies = [{:name=>"rails", :version=>'4.1.0.beta1'}]
21
- @check.vuln?.should == true
21
+ expect(@check.vuln?).to eq(true)
22
22
  end
23
23
 
24
24
  it "doesn't affect version 4.0.3" do
25
25
  @check.dependencies = [{:name=>"rails", :version=>'4.0.3'}]
26
- @check.vuln?.should == false
26
+ expect(@check.vuln?).to eq(false)
27
27
  end
28
28
  end
@@ -6,19 +6,19 @@ describe "The CVE-2014-0081 vulnerability" do
6
6
  end
7
7
  it "affects version 3.2.16" do
8
8
  @check.dependencies = [{:name=>"rails", :version=>'3.2.16'}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
  it "affects version 4.0.0" do
12
12
  @check.dependencies = [{:name=>"rails", :version=>'4.0.0'}]
13
- @check.vuln?.should == true
13
+ expect(@check.vuln?).to eq(true)
14
14
  end
15
15
  it "affects version 4.0.2" do
16
16
  @check.dependencies = [{:name=>"rails", :version=>'4.0.2'}]
17
- @check.vuln?.should == true
17
+ expect(@check.vuln?).to eq(true)
18
18
  end
19
19
  it "affects version 4.0.1" do
20
20
  @check.dependencies = [{:name=>"rails", :version=>'4.0.1'}]
21
- @check.vuln?.should == true
21
+ expect(@check.vuln?).to eq(true)
22
22
  end
23
23
 
24
24
  it "affects version 3.1.x" do
@@ -27,7 +27,7 @@ describe "The CVE-2014-0081 vulnerability" do
27
27
  version = "3.1.#{rand}"
28
28
 
29
29
  @check.dependencies = [{:name=>"rails", :version=>version}]
30
- @check.vuln?.should == true
30
+ expect(@check.vuln?).to eq(true)
31
31
  end
32
32
 
33
33
  it "affects version 3.0.x" do
@@ -36,7 +36,7 @@ describe "The CVE-2014-0081 vulnerability" do
36
36
  version = "3.0.#{rand}"
37
37
 
38
38
  @check.dependencies = [{:name=>"rails", :version=>version}]
39
- @check.vuln?.should == true
39
+ expect(@check.vuln?).to eq(true)
40
40
  end
41
41
  it "affects version 2.x.y" do
42
42
  require 'securerandom'
@@ -45,7 +45,7 @@ describe "The CVE-2014-0081 vulnerability" do
45
45
  version = "2.#{rand_min}.#{rand_patch}"
46
46
 
47
47
  @check.dependencies = [{:name=>"rails", :version=>version}]
48
- @check.vuln?.should == true
48
+ expect(@check.vuln?).to eq(true)
49
49
  end
50
50
  it "affects version 1.x.y" do
51
51
  require 'securerandom'
@@ -54,15 +54,15 @@ describe "The CVE-2014-0081 vulnerability" do
54
54
  version = "1.#{rand_min}.#{rand_patch}"
55
55
 
56
56
  @check.dependencies = [{:name=>"rails", :version=>version}]
57
- @check.vuln?.should == true
57
+ expect(@check.vuln?).to eq(true)
58
58
  end
59
59
 
60
60
  it "doesn't affect version 4.0.3" do
61
61
  @check.dependencies = [{:name=>"rails", :version=>'4.0.3'}]
62
- @check.vuln?.should == false
62
+ expect(@check.vuln?).to eq(false)
63
63
  end
64
64
  it "doesn't affect version 3.2.17" do
65
65
  @check.dependencies = [{:name=>"rails", :version=>'3.2.17'}]
66
- @check.vuln?.should == false
66
+ expect(@check.vuln?).to eq(false)
67
67
  end
68
68
  end
@@ -10,7 +10,7 @@ describe "The CVE-2014-0082 vulnerability" do
10
10
  version = "3.0.#{rand}"
11
11
 
12
12
  @check.dependencies = [{:name=>"rails", :version=>version}]
13
- @check.vuln?.should == true
13
+ expect(@check.vuln?).to eq(true)
14
14
  end
15
15
  it "affects version 2.x.y" do
16
16
  require 'securerandom'
@@ -18,7 +18,7 @@ describe "The CVE-2014-0082 vulnerability" do
18
18
  rand_patch = SecureRandom.random_number(9999)
19
19
  version = "2.#{rand_min}.#{rand_patch}"
20
20
  @check.dependencies = [{:name=>"rails", :version=>version}]
21
- @check.vuln?.should == true
21
+ expect(@check.vuln?).to eq(true)
22
22
  end
23
23
  it "affects version 1.x.y" do
24
24
  require 'securerandom'
@@ -27,26 +27,26 @@ describe "The CVE-2014-0082 vulnerability" do
27
27
  version = "1.#{rand_min}.#{rand_patch}"
28
28
 
29
29
  @check.dependencies = [{:name=>"rails", :version=>version}]
30
- @check.vuln?.should == true
30
+ expect(@check.vuln?).to eq(true)
31
31
  end
32
32
  it "doesn't affect version 4.0.2" do
33
33
  @check.dependencies = [{:name=>"rails", :version=>'4.0.2'}]
34
- @check.vuln?.should == false
34
+ expect(@check.vuln?).to eq(false)
35
35
  end
36
36
  it "doesn't affect version 4.0.1" do
37
37
  @check.dependencies = [{:name=>"rails", :version=>'4.0.1'}]
38
- @check.vuln?.should == false
38
+ expect(@check.vuln?).to eq(false)
39
39
  end
40
40
  it "doesn't affect version 4.0.0" do
41
41
  @check.dependencies = [{:name=>"rails", :version=>'4.0.0'}]
42
- @check.vuln?.should == false
42
+ expect(@check.vuln?).to eq(false)
43
43
  end
44
44
  it "doesn't affect version 4.0.3" do
45
45
  @check.dependencies = [{:name=>"rails", :version=>'4.0.3'}]
46
- @check.vuln?.should == false
46
+ expect(@check.vuln?).to eq(false)
47
47
  end
48
48
  it "doesn't affect version 3.2.17" do
49
49
  @check.dependencies = [{:name=>"rails", :version=>'3.2.17'}]
50
- @check.vuln?.should == false
50
+ expect(@check.vuln?).to eq(false)
51
51
  end
52
52
  end
@@ -6,14 +6,14 @@ describe "The CVE-2014-0130 vulnerability" do
6
6
  end
7
7
  it "is reported when rails 4.1.0 is detected" do
8
8
  @check.dependencies = [{:name=>"rails", :version=>'4.1.0'}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
  it "is reported when rails 4.0.4 is detected" do
12
12
  @check.dependencies = [{:name=>"rails", :version=>'4.0.4'}]
13
- @check.vuln?.should == true
13
+ expect(@check.vuln?).to eq(true)
14
14
  end
15
15
  it "is reported when rails 3.2.17 is detected" do
16
16
  @check.dependencies = [{:name=>"rails", :version=>'3.2.17'}]
17
- @check.vuln?.should == true
17
+ expect(@check.vuln?).to eq(true)
18
18
  end
19
19
  end
@@ -6,10 +6,10 @@ describe "The CVE-2014-1233 vulnerability" do
6
6
  end
7
7
  it "is reported when a paratrooper-pingdom gem version 1.0.0 is detected" do
8
8
  @check.dependencies = [{:name=>"paratrooper-pingdom", :version=>"1.0.0"}]
9
- @check.vuln?.should == true
9
+ expect(@check.vuln?).to eq(true)
10
10
  end
11
11
  it "is not reported when a paratrooper-pingdom gem version 1.0.1 is detected" do
12
12
  @check.dependencies = [{:name=>"paratrooper-pingdom", :version=>"1.0.1"}]
13
- @check.vuln?.should == false
13
+ expect(@check.vuln?).to eq(false)
14
14
  end
15
15
  end