dawnscanner 1.6.1 → 1.6.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data.tar.gz.sig +0 -0
- data/.ruby-version +1 -1
- data/.travis.yml +2 -0
- data/Changelog.md +10 -1
- data/KnowledgeBase.md +10 -4
- data/README.md +1 -1
- data/Rakefile +12 -8
- data/VERSION +1 -1
- data/checksum/dawnscanner-1.6.1.gem.sha1 +1 -0
- data/lib/dawn/kb/cve_2016_2097.rb +35 -0
- data/lib/dawn/kb/cve_2016_2098.rb +34 -0
- data/lib/dawn/knowledge_base.rb +4 -0
- data/lib/dawn/version.rb +4 -4
- data/spec/lib/dawn/codesake_core_spec.rb +1 -1
- data/spec/lib/dawn/codesake_knowledgebase_spec.rb +451 -441
- data/spec/lib/dawn/codesake_padrino_engine_disabled.rb +11 -11
- data/spec/lib/dawn/codesake_rails_engine_disabled.rb +2 -2
- data/spec/lib/dawn/codesake_sinatra_engine_disabled.rb +36 -36
- data/spec/lib/kb/codesake_cve_2013_0175_spec.rb +6 -6
- data/spec/lib/kb/codesake_cve_2013_4457_spec.rb +7 -7
- data/spec/lib/kb/codesake_dependency_version_check_spec.rb +10 -10
- data/spec/lib/kb/codesake_deprecation_check_spec.rb +11 -11
- data/spec/lib/kb/codesake_ruby_version_check_spec.rb +4 -4
- data/spec/lib/kb/codesake_version_check_spec.rb +42 -42
- data/spec/lib/kb/cve_2011_2705_spec.rb +7 -7
- data/spec/lib/kb/cve_2011_2930_spec.rb +6 -6
- data/spec/lib/kb/cve_2011_3009_spec.rb +4 -4
- data/spec/lib/kb/cve_2011_3187_spec.rb +4 -4
- data/spec/lib/kb/cve_2011_4319_spec.rb +9 -9
- data/spec/lib/kb/cve_2011_5036_spec.rb +21 -21
- data/spec/lib/kb/cve_2012_1098_spec.rb +7 -7
- data/spec/lib/kb/cve_2012_2139_spec.rb +3 -3
- data/spec/lib/kb/cve_2012_2671_spec.rb +4 -4
- data/spec/lib/kb/cve_2012_6109_spec.rb +25 -25
- data/spec/lib/kb/cve_2012_6684_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_0162_spec.rb +4 -4
- data/spec/lib/kb/cve_2013_0183_spec.rb +11 -11
- data/spec/lib/kb/cve_2013_0184_spec.rb +26 -26
- data/spec/lib/kb/cve_2013_0256_spec.rb +6 -6
- data/spec/lib/kb/cve_2013_0262_spec.rb +9 -9
- data/spec/lib/kb/cve_2013_0263_spec.rb +1 -1
- data/spec/lib/kb/cve_2013_1607_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_1655_spec.rb +4 -4
- data/spec/lib/kb/cve_2013_1756_spec.rb +4 -4
- data/spec/lib/kb/cve_2013_2090_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_2105_spec.rb +1 -1
- data/spec/lib/kb/cve_2013_2119_spec.rb +5 -5
- data/spec/lib/kb/cve_2013_2512_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_2513_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_2516_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_4203_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_4413_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_4489_spec.rb +11 -11
- data/spec/lib/kb/cve_2013_4491_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_4593_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_5647_spec.rb +3 -3
- data/spec/lib/kb/cve_2013_5671_spec.rb +4 -4
- data/spec/lib/kb/cve_2013_6416_spec.rb +5 -5
- data/spec/lib/kb/cve_2013_6459_spec.rb +2 -2
- data/spec/lib/kb/cve_2013_7086_spec.rb +3 -3
- data/spec/lib/kb/cve_2014_0036_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_0080_spec.rb +5 -5
- data/spec/lib/kb/cve_2014_0081_spec.rb +10 -10
- data/spec/lib/kb/cve_2014_0082_spec.rb +8 -8
- data/spec/lib/kb/cve_2014_0130_spec.rb +3 -3
- data/spec/lib/kb/cve_2014_1233_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_1234_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_2322_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_2538_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_3482_spec.rb +2 -2
- data/spec/lib/kb/cve_2014_3483_spec.rb +5 -5
- data/spec/lib/kb/cve_2014_7818_spec.rb +8 -8
- data/spec/lib/kb/cve_2014_7819_spec.rb +32 -32
- data/spec/lib/kb/cve_2014_7829_spec.rb +10 -10
- data/spec/lib/kb/cve_2014_9490_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_1819_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_1840_spec.rb +7 -7
- data/spec/lib/kb/cve_2015_2963_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_3224_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_3225_spec.rb +5 -5
- data/spec/lib/kb/cve_2015_3226_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_3227_spec.rb +5 -5
- data/spec/lib/kb/cve_2015_3448_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_4020_spec.rb +4 -4
- data/spec/lib/kb/cve_2015_5312_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_7497_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_7498_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_7499_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_7500_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_7519_spec.rb +4 -4
- data/spec/lib/kb/cve_2015_7541_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_7576_spec.rb +11 -11
- data/spec/lib/kb/cve_2015_7577_spec.rb +11 -11
- data/spec/lib/kb/cve_2015_7578_spec.rb +2 -2
- data/spec/lib/kb/cve_2015_7579_spec.rb +4 -4
- data/spec/lib/kb/cve_2015_7581_spec.rb +11 -11
- data/spec/lib/kb/cve_2015_8241_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_8242_spec.rb +6 -6
- data/spec/lib/kb/cve_2015_8317_spec.rb +6 -6
- data/spec/lib/kb/cve_2016_0751_spec.rb +11 -11
- data/spec/lib/kb/cve_2016_0752_spec.rb +11 -11
- data/spec/lib/kb/cve_2016_0753_spec.rb +11 -11
- data/spec/lib/kb/cve_2016_2097_spec.rb +35 -0
- data/spec/lib/kb/cve_2016_2098_spec.rb +39 -0
- data/spec/lib/kb/osvdb_105971_spec.rb +2 -2
- data/spec/lib/kb/osvdb_108530_spec.rb +3 -3
- data/spec/lib/kb/osvdb_108563_spec.rb +2 -2
- data/spec/lib/kb/osvdb_108569_spec.rb +2 -2
- data/spec/lib/kb/osvdb_108570_spec.rb +2 -2
- data/spec/lib/kb/osvdb_115654_spec.rb +2 -2
- data/spec/lib/kb/osvdb_116010_spec.rb +2 -2
- data/spec/lib/kb/osvdb_117903_spec.rb +4 -4
- data/spec/lib/kb/osvdb_118830_spec.rb +2 -2
- data/spec/lib/kb/osvdb_118954_spec.rb +3 -3
- data/spec/lib/kb/osvdb_119878_spec.rb +21 -21
- data/spec/lib/kb/osvdb_119927_spec.rb +2 -2
- data/spec/lib/kb/osvdb_120415_spec.rb +2 -2
- data/spec/lib/kb/osvdb_120857_spec.rb +6 -6
- data/spec/lib/kb/osvdb_121701_spec.rb +2 -2
- data/spec/lib/kb/owasp_ror_cheatsheet_disabled.rb +10 -10
- metadata +9 -2
- metadata.gz.sig +0 -0
@@ -6,10 +6,10 @@ describe "The CVE-2013-2513 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "is reported when a flash_tool gem version 0.6.0 is detected" do
|
8
8
|
@check.dependencies = [{:name=>"flash_tool", :version=>"0.6.0"}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
it "is not reported when a flash_tool gem version 0.6.1 is detected" do
|
12
12
|
@check.dependencies = [{:name=>"flash_tool", :version=>"0.6.1"}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(false)
|
14
14
|
end
|
15
15
|
end
|
@@ -6,10 +6,10 @@ describe "The CVE-2013-2516 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "is reported when a fileutils gem version 0.7 is detected" do
|
8
8
|
@check.dependencies = [{:name=>"fileutils", :version=>"0.7"}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
it "is not reported when a fileutils gem version 0.8 is detected" do
|
12
12
|
@check.dependencies = [{:name=>"fileutils", :version=>"0.8"}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(false)
|
14
14
|
end
|
15
15
|
end
|
@@ -6,10 +6,10 @@ describe "The CVE-2013-4203 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "is reported when a vulnerable rgpg version is detected (0.2.2)" do
|
8
8
|
@check.dependencies = [{:name=>"rgpg", :version=>"0.2.2"}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
it "is not reported when a safe rgpg version is detected (0.2.3)" do
|
12
12
|
@check.dependencies = [{:name=>"rgpg", :version=>"0.2.3"}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(false)
|
14
14
|
end
|
15
15
|
end
|
@@ -7,10 +7,10 @@ describe "The CVE-2013-4413 vulnerability" do
|
|
7
7
|
|
8
8
|
it "is reported when the vulnerable gem is detected" do
|
9
9
|
@check.dependencies = [{:name=>"wicked", :version=>"1.0.0"}]
|
10
|
-
@check.vuln
|
10
|
+
expect(@check.vuln?).to eq(true)
|
11
11
|
end
|
12
12
|
it "is not reported when a fixed release is detected" do
|
13
13
|
@check.dependencies = [{:name=>"wicked", :version=>"1.0.1"}]
|
14
|
-
@check.vuln
|
14
|
+
expect(@check.vuln?).to eq(false)
|
15
15
|
end
|
16
16
|
end
|
@@ -8,56 +8,56 @@ describe "The CVE-2013-4489 vulnerability" do
|
|
8
8
|
|
9
9
|
it "is reported when the vulnerable gem is detected" do
|
10
10
|
@check.dependencies = [{:name=>"grit", :version=>"5.2"}]
|
11
|
-
@check.vuln
|
11
|
+
expect(@check.vuln?).to eq(true)
|
12
12
|
end
|
13
13
|
|
14
14
|
it "is reported when the vulnerable gem is detected" do
|
15
15
|
@check.dependencies = [{:name=>"grit", :version=>"5.3"}]
|
16
|
-
@check.vuln
|
16
|
+
expect(@check.vuln?).to eq(true)
|
17
17
|
end
|
18
18
|
|
19
19
|
it "is reported when the vulnerable gem is detected" do
|
20
20
|
@check.dependencies = [{:name=>"grit", :version=>"5.4"}]
|
21
|
-
@check.vuln
|
21
|
+
expect(@check.vuln?).to eq(true)
|
22
22
|
end
|
23
23
|
|
24
24
|
it "is reported when the vulnerable gem is detected" do
|
25
25
|
@check.dependencies = [{:name=>"grit", :version=>"6.0"}]
|
26
|
-
@check.vuln
|
26
|
+
expect(@check.vuln?).to eq(true)
|
27
27
|
end
|
28
28
|
|
29
29
|
it "is reported when the vulnerable gem is detected" do
|
30
30
|
@check.dependencies = [{:name=>"grit", :version=>"6.1"}]
|
31
|
-
@check.vuln
|
31
|
+
expect(@check.vuln?).to eq(true)
|
32
32
|
end
|
33
33
|
|
34
34
|
it "is reported when the vulnerable gem is detected" do
|
35
35
|
@check.dependencies = [{:name=>"grit", :version=>"6.2"}]
|
36
|
-
@check.vuln
|
36
|
+
expect(@check.vuln?).to eq(true)
|
37
37
|
end
|
38
38
|
|
39
39
|
it "is not reported when a fixed release is detected" do
|
40
40
|
@check.dependencies = [{:name=>"grit", :version=>"5.1"}]
|
41
|
-
@check.vuln
|
41
|
+
expect(@check.vuln?).to eq(false)
|
42
42
|
end
|
43
43
|
|
44
44
|
it "is not reported when a fixed release is detected" do
|
45
45
|
@check.dependencies = [{:name=>"grit", :version=>"5.0"}]
|
46
|
-
@check.vuln
|
46
|
+
expect(@check.vuln?).to eq(false)
|
47
47
|
end
|
48
48
|
|
49
49
|
it "is not reported when a fixed release is detected" do
|
50
50
|
@check.dependencies = [{:name=>"grit", :version=>"3.2"}]
|
51
|
-
@check.vuln
|
51
|
+
expect(@check.vuln?).to eq(false)
|
52
52
|
end
|
53
53
|
|
54
54
|
it "is not reported when a fixed release is detected" do
|
55
55
|
@check.dependencies = [{:name=>"grit", :version=>"5.4.1"}]
|
56
|
-
@check.vuln
|
56
|
+
expect(@check.vuln?).to eq(false)
|
57
57
|
end
|
58
58
|
|
59
59
|
it "is not reported when a fixed release is detected" do
|
60
60
|
@check.dependencies = [{:name=>"grit", :version=>"6.2.3"}]
|
61
|
-
@check.vuln
|
61
|
+
expect(@check.vuln?).to eq(false)
|
62
62
|
end
|
63
63
|
end
|
@@ -7,10 +7,10 @@ describe "The CVE-2013-4491 vulnerability" do
|
|
7
7
|
|
8
8
|
it "is reported when the vulnerable gem is detected" do
|
9
9
|
@check.dependencies = [{:name=>"rails", :version=>"3.2.15"}]
|
10
|
-
@check.vuln
|
10
|
+
expect(@check.vuln?).to eq(true)
|
11
11
|
end
|
12
12
|
it "is not reported when a fixed release is detected" do
|
13
13
|
@check.dependencies = [{:name=>"rails", :version=>"3.2.22"}]
|
14
|
-
@check.vuln
|
14
|
+
expect(@check.vuln?).to eq(false)
|
15
15
|
end
|
16
16
|
end
|
@@ -7,10 +7,10 @@ describe "The CVE-2013-4593 vulnerability" do
|
|
7
7
|
|
8
8
|
it "is reported when a omniauth-facebook gem version 1.5.0 is detected" do
|
9
9
|
@check.dependencies = [{:name=>"omniauth-facebook", :version=>"1.5.0"}]
|
10
|
-
@check.vuln
|
10
|
+
expect(@check.vuln?).to eq(true)
|
11
11
|
end
|
12
12
|
it "is not reported when a omniauth-facebook gem version 1.5.1 is detected" do
|
13
13
|
@check.dependencies = [{:name=>"omniauth-facebook", :version=>"1.5.1"}]
|
14
|
-
@check.vuln
|
14
|
+
expect(@check.vuln?).to eq(false)
|
15
15
|
end
|
16
16
|
end
|
@@ -6,14 +6,14 @@ describe "The CVE-2013-5647 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "fires when vulnerable sounder 1.0.1 version is userd" do
|
8
8
|
@check.dependencies = [{:name=>"sounder", :version=>'1.0.1'}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
it "doesn't fire when sounder not vulnerable version is used" do
|
12
12
|
@check.dependencies = [{:name=>"sounder", :version=>'1.0.2'}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(false)
|
14
14
|
end
|
15
15
|
it "doesn't fire when a very old sounder version is used" do
|
16
16
|
@check.dependencies = [{:name=>"sounder", :version=>'0.9.2'}]
|
17
|
-
@check.vuln
|
17
|
+
expect(@check.vuln?).to eq(false)
|
18
18
|
end
|
19
19
|
end
|
@@ -7,21 +7,21 @@ describe "The CVE-2013-5671 vulnerability" do
|
|
7
7
|
|
8
8
|
it "is reported when a fog-dragonfly gem version 0.8.2 is detected" do
|
9
9
|
@check.dependencies = [{:name=>"fog-dragonfly", :version=>"0.8.2"}]
|
10
|
-
@check.vuln
|
10
|
+
expect(@check.vuln?).to eq(true)
|
11
11
|
end
|
12
12
|
|
13
13
|
it "is reported when a fog-dragonfly gem version 0.8.0 is detected" do
|
14
14
|
@check.dependencies = [{:name=>"fog-dragonfly", :version=>"0.8.0"}]
|
15
|
-
@check.vuln
|
15
|
+
expect(@check.vuln?).to eq(true)
|
16
16
|
end
|
17
17
|
|
18
18
|
it "is reported when a fog-dragonfly gem version 0.7.5 is detected" do
|
19
19
|
@check.dependencies = [{:name=>"fog-dragonfly", :version=>"0.7.5"}]
|
20
|
-
@check.vuln
|
20
|
+
expect(@check.vuln?).to eq(true)
|
21
21
|
end
|
22
22
|
|
23
23
|
it "is not reported when a paratrooper-pingdom gem version 0.8.3 is detected" do
|
24
24
|
@check.dependencies = [{:name=>"fog-dragonfly", :version=>"0.8.3"}]
|
25
|
-
@check.vuln
|
25
|
+
expect(@check.vuln?).to eq(false)
|
26
26
|
end
|
27
27
|
end
|
@@ -7,24 +7,24 @@ describe "The CVE-2013-6416 vulnerability" do
|
|
7
7
|
end
|
8
8
|
it "is detected if vulnerable version of rails rubygem is detected" do
|
9
9
|
@check.dependencies=[{:name=>"rails", :version=>'4.0.1'}]
|
10
|
-
@check.vuln
|
10
|
+
expect(@check.vuln?).to eq(true)
|
11
11
|
end
|
12
12
|
it "is ignored if rails version is 3.2.x" do
|
13
13
|
@check.dependencies=[{:name=>"rails", :version=>'3.2.16'}]
|
14
|
-
@check.vuln
|
14
|
+
expect(@check.vuln?).to eq(false)
|
15
15
|
end
|
16
16
|
|
17
17
|
it "is ignored if rails version is 3.1.x" do
|
18
18
|
@check.dependencies=[{:name=>"rails", :version=>'3.1.16'}]
|
19
|
-
@check.vuln
|
19
|
+
expect(@check.vuln?).to eq(false)
|
20
20
|
end
|
21
21
|
it "is ignored if rails version is 3.0.x" do
|
22
22
|
@check.dependencies=[{:name=>"rails", :version=>'3.0.16'}]
|
23
|
-
@check.vuln
|
23
|
+
expect(@check.vuln?).to eq(false)
|
24
24
|
end
|
25
25
|
it "is ignored if rails version is 2.3.x" do
|
26
26
|
@check.dependencies=[{:name=>"rails", :version=>'2.3.16'}]
|
27
|
-
@check.vuln
|
27
|
+
expect(@check.vuln?).to eq(false)
|
28
28
|
end
|
29
29
|
|
30
30
|
|
@@ -6,10 +6,10 @@ describe "The CVE-2013-6459 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "fires when will_paginage 3.0.4 vulnerable version is used" do
|
8
8
|
@check.dependencies = [{:name=>"will_paginate", :version=>'3.0.4'}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
it "doesn't fires when will_paginage 3.0.5 safe version is used" do
|
12
12
|
@check.dependencies = [{:name=>"will_paginate", :version=>'3.0.5'}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(false)
|
14
14
|
end
|
15
15
|
end
|
@@ -6,17 +6,17 @@ describe "The CVE-2013-7086 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "is detected for gem 1.0.5.3" do
|
8
8
|
@check.dependencies = [{:name=>"webbynode", :version=>'1.0.5.3'}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
|
12
12
|
it "is detected for gem 1.0.4.3" do
|
13
13
|
@check.dependencies = [{:name=>"webbynode", :version=>'1.0.4.3'}]
|
14
|
-
@check.vuln
|
14
|
+
expect(@check.vuln?).to eq(true)
|
15
15
|
end
|
16
16
|
|
17
17
|
it "is not detected for gem 1.0.5.4" do
|
18
18
|
@check.dependencies = [{:name=>"webbynode", :version=>'1.0.5.4'}]
|
19
|
-
@check.vuln
|
19
|
+
expect(@check.vuln?).to eq(false)
|
20
20
|
end
|
21
21
|
|
22
22
|
end
|
@@ -6,10 +6,10 @@ describe "The CVE-2014-0036 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "is reported when a vulnerable rbovirt gem version is detected (0.0.23)" do
|
8
8
|
@check.dependencies = [{:name=>"rbovirt", :version=>'0.0.23'}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
it "is not reported when a sage rbovirt gem version is detected (0.0.24)" do
|
12
12
|
@check.dependencies = [{:name=>"rbovirt", :version=>'0.0.24'}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(false)
|
14
14
|
end
|
15
15
|
end
|
@@ -6,23 +6,23 @@ describe "The CVE-2014-0080 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "affects version 4.0.0" do
|
8
8
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.0'}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
it "affects version 4.0.2" do
|
12
12
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.2'}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(true)
|
14
14
|
end
|
15
15
|
it "affects version 4.0.1" do
|
16
16
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.1'}]
|
17
|
-
@check.vuln
|
17
|
+
expect(@check.vuln?).to eq(true)
|
18
18
|
end
|
19
19
|
it "affects version 4.1.0.beta1" do
|
20
20
|
@check.dependencies = [{:name=>"rails", :version=>'4.1.0.beta1'}]
|
21
|
-
@check.vuln
|
21
|
+
expect(@check.vuln?).to eq(true)
|
22
22
|
end
|
23
23
|
|
24
24
|
it "doesn't affect version 4.0.3" do
|
25
25
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.3'}]
|
26
|
-
@check.vuln
|
26
|
+
expect(@check.vuln?).to eq(false)
|
27
27
|
end
|
28
28
|
end
|
@@ -6,19 +6,19 @@ describe "The CVE-2014-0081 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "affects version 3.2.16" do
|
8
8
|
@check.dependencies = [{:name=>"rails", :version=>'3.2.16'}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
it "affects version 4.0.0" do
|
12
12
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.0'}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(true)
|
14
14
|
end
|
15
15
|
it "affects version 4.0.2" do
|
16
16
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.2'}]
|
17
|
-
@check.vuln
|
17
|
+
expect(@check.vuln?).to eq(true)
|
18
18
|
end
|
19
19
|
it "affects version 4.0.1" do
|
20
20
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.1'}]
|
21
|
-
@check.vuln
|
21
|
+
expect(@check.vuln?).to eq(true)
|
22
22
|
end
|
23
23
|
|
24
24
|
it "affects version 3.1.x" do
|
@@ -27,7 +27,7 @@ describe "The CVE-2014-0081 vulnerability" do
|
|
27
27
|
version = "3.1.#{rand}"
|
28
28
|
|
29
29
|
@check.dependencies = [{:name=>"rails", :version=>version}]
|
30
|
-
@check.vuln
|
30
|
+
expect(@check.vuln?).to eq(true)
|
31
31
|
end
|
32
32
|
|
33
33
|
it "affects version 3.0.x" do
|
@@ -36,7 +36,7 @@ describe "The CVE-2014-0081 vulnerability" do
|
|
36
36
|
version = "3.0.#{rand}"
|
37
37
|
|
38
38
|
@check.dependencies = [{:name=>"rails", :version=>version}]
|
39
|
-
@check.vuln
|
39
|
+
expect(@check.vuln?).to eq(true)
|
40
40
|
end
|
41
41
|
it "affects version 2.x.y" do
|
42
42
|
require 'securerandom'
|
@@ -45,7 +45,7 @@ describe "The CVE-2014-0081 vulnerability" do
|
|
45
45
|
version = "2.#{rand_min}.#{rand_patch}"
|
46
46
|
|
47
47
|
@check.dependencies = [{:name=>"rails", :version=>version}]
|
48
|
-
@check.vuln
|
48
|
+
expect(@check.vuln?).to eq(true)
|
49
49
|
end
|
50
50
|
it "affects version 1.x.y" do
|
51
51
|
require 'securerandom'
|
@@ -54,15 +54,15 @@ describe "The CVE-2014-0081 vulnerability" do
|
|
54
54
|
version = "1.#{rand_min}.#{rand_patch}"
|
55
55
|
|
56
56
|
@check.dependencies = [{:name=>"rails", :version=>version}]
|
57
|
-
@check.vuln
|
57
|
+
expect(@check.vuln?).to eq(true)
|
58
58
|
end
|
59
59
|
|
60
60
|
it "doesn't affect version 4.0.3" do
|
61
61
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.3'}]
|
62
|
-
@check.vuln
|
62
|
+
expect(@check.vuln?).to eq(false)
|
63
63
|
end
|
64
64
|
it "doesn't affect version 3.2.17" do
|
65
65
|
@check.dependencies = [{:name=>"rails", :version=>'3.2.17'}]
|
66
|
-
@check.vuln
|
66
|
+
expect(@check.vuln?).to eq(false)
|
67
67
|
end
|
68
68
|
end
|
@@ -10,7 +10,7 @@ describe "The CVE-2014-0082 vulnerability" do
|
|
10
10
|
version = "3.0.#{rand}"
|
11
11
|
|
12
12
|
@check.dependencies = [{:name=>"rails", :version=>version}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(true)
|
14
14
|
end
|
15
15
|
it "affects version 2.x.y" do
|
16
16
|
require 'securerandom'
|
@@ -18,7 +18,7 @@ describe "The CVE-2014-0082 vulnerability" do
|
|
18
18
|
rand_patch = SecureRandom.random_number(9999)
|
19
19
|
version = "2.#{rand_min}.#{rand_patch}"
|
20
20
|
@check.dependencies = [{:name=>"rails", :version=>version}]
|
21
|
-
@check.vuln
|
21
|
+
expect(@check.vuln?).to eq(true)
|
22
22
|
end
|
23
23
|
it "affects version 1.x.y" do
|
24
24
|
require 'securerandom'
|
@@ -27,26 +27,26 @@ describe "The CVE-2014-0082 vulnerability" do
|
|
27
27
|
version = "1.#{rand_min}.#{rand_patch}"
|
28
28
|
|
29
29
|
@check.dependencies = [{:name=>"rails", :version=>version}]
|
30
|
-
@check.vuln
|
30
|
+
expect(@check.vuln?).to eq(true)
|
31
31
|
end
|
32
32
|
it "doesn't affect version 4.0.2" do
|
33
33
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.2'}]
|
34
|
-
@check.vuln
|
34
|
+
expect(@check.vuln?).to eq(false)
|
35
35
|
end
|
36
36
|
it "doesn't affect version 4.0.1" do
|
37
37
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.1'}]
|
38
|
-
@check.vuln
|
38
|
+
expect(@check.vuln?).to eq(false)
|
39
39
|
end
|
40
40
|
it "doesn't affect version 4.0.0" do
|
41
41
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.0'}]
|
42
|
-
@check.vuln
|
42
|
+
expect(@check.vuln?).to eq(false)
|
43
43
|
end
|
44
44
|
it "doesn't affect version 4.0.3" do
|
45
45
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.3'}]
|
46
|
-
@check.vuln
|
46
|
+
expect(@check.vuln?).to eq(false)
|
47
47
|
end
|
48
48
|
it "doesn't affect version 3.2.17" do
|
49
49
|
@check.dependencies = [{:name=>"rails", :version=>'3.2.17'}]
|
50
|
-
@check.vuln
|
50
|
+
expect(@check.vuln?).to eq(false)
|
51
51
|
end
|
52
52
|
end
|
@@ -6,14 +6,14 @@ describe "The CVE-2014-0130 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "is reported when rails 4.1.0 is detected" do
|
8
8
|
@check.dependencies = [{:name=>"rails", :version=>'4.1.0'}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
it "is reported when rails 4.0.4 is detected" do
|
12
12
|
@check.dependencies = [{:name=>"rails", :version=>'4.0.4'}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(true)
|
14
14
|
end
|
15
15
|
it "is reported when rails 3.2.17 is detected" do
|
16
16
|
@check.dependencies = [{:name=>"rails", :version=>'3.2.17'}]
|
17
|
-
@check.vuln
|
17
|
+
expect(@check.vuln?).to eq(true)
|
18
18
|
end
|
19
19
|
end
|
@@ -6,10 +6,10 @@ describe "The CVE-2014-1233 vulnerability" do
|
|
6
6
|
end
|
7
7
|
it "is reported when a paratrooper-pingdom gem version 1.0.0 is detected" do
|
8
8
|
@check.dependencies = [{:name=>"paratrooper-pingdom", :version=>"1.0.0"}]
|
9
|
-
@check.vuln
|
9
|
+
expect(@check.vuln?).to eq(true)
|
10
10
|
end
|
11
11
|
it "is not reported when a paratrooper-pingdom gem version 1.0.1 is detected" do
|
12
12
|
@check.dependencies = [{:name=>"paratrooper-pingdom", :version=>"1.0.1"}]
|
13
|
-
@check.vuln
|
13
|
+
expect(@check.vuln?).to eq(false)
|
14
14
|
end
|
15
15
|
end
|