mrjoy-bundler-audit 0.1.4
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.document +3 -0
- data/.gitignore +6 -0
- data/.gitmodules +3 -0
- data/.rspec +1 -0
- data/.travis.yml +5 -0
- data/.yardopts +1 -0
- data/COPYING.txt +674 -0
- data/ChangeLog.md +79 -0
- data/Gemfile +14 -0
- data/README.md +105 -0
- data/Rakefile +47 -0
- data/bin/bundle-audit +10 -0
- data/data/ruby-advisory-db/.rspec +1 -0
- data/data/ruby-advisory-db/CONTRIBUTING.md +6 -0
- data/data/ruby-advisory-db/CONTRIBUTORS.md +13 -0
- data/data/ruby-advisory-db/Gemfile +3 -0
- data/data/ruby-advisory-db/LICENSE.txt +5 -0
- data/data/ruby-advisory-db/README.md +86 -0
- data/data/ruby-advisory-db/Rakefile +27 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-79727.yml +26 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-84243.yml +28 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-84513.yml +23 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-84515.yml +26 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-89026.yml +24 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +20 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +23 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-82403.yml +25 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-82610.yml +24 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-89025.yml +24 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-90072.yml +21 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-90073.yml +23 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-91453.yml +26 -0
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-79726.yml +26 -0
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-84516.yml +23 -0
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-89594.yml +25 -0
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-91451.yml +28 -0
- data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +10 -0
- data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +17 -0
- data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +11 -0
- data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +12 -0
- data/data/ruby-advisory-db/gems/devise/OSVDB-89642.yml +20 -0
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +19 -0
- data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +9 -0
- data/data/ruby-advisory-db/gems/extlib/OSVDB-90740.yml +18 -0
- data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +12 -0
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +10 -0
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +10 -0
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +10 -0
- data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +9 -0
- data/data/ruby-advisory-db/gems/ftpd/OSVDB-90784.yml +18 -0
- data/data/ruby-advisory-db/gems/gtk2/OSVDB-40774.yml +20 -0
- data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +19 -0
- data/data/ruby-advisory-db/gems/json/OSVDB-90074.yml +23 -0
- data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +10 -0
- data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +10 -0
- data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +10 -0
- data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +21 -0
- data/data/ruby-advisory-db/gems/mail/OSVDB-70667.yml +21 -0
- data/data/ruby-advisory-db/gems/mail/OSVDB-81631.yml +14 -0
- data/data/ruby-advisory-db/gems/mail/OSVDB-81632.yml +16 -0
- data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +10 -0
- data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +15 -0
- data/data/ruby-advisory-db/gems/multi_xml/OSVDB-89148.yml +16 -0
- data/data/ruby-advisory-db/gems/newrelic_rpm/OSVDB-90189.yml +17 -0
- data/data/ruby-advisory-db/gems/nori/OSVDB-90196.yml +19 -0
- data/data/ruby-advisory-db/gems/omniauth-oauth2/OSVDB-90264.yml +16 -0
- data/data/ruby-advisory-db/gems/pdfkit/OSVDB-90867.yml +11 -0
- data/data/ruby-advisory-db/gems/rack-cache/OSVDB-83077.yml +18 -0
- data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +23 -0
- data/data/ruby-advisory-db/gems/rdoc/OSVDB-90004.yml +27 -0
- data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +13 -0
- data/data/ruby-advisory-db/gems/ruby_parser/OSVDB-90561.yml +11 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +10 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +10 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +10 -0
- data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +10 -0
- data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +10 -0
- data/data/ruby-advisory-db/lib/scrape.rb +87 -0
- data/data/ruby-advisory-db/spec/advisory_example.rb +165 -0
- data/data/ruby-advisory-db/spec/gems_spec.rb +8 -0
- data/data/ruby-advisory-db/spec/spec_helper.rb +1 -0
- data/gemspec.yml +16 -0
- data/lib/bundler/audit.rb +21 -0
- data/lib/bundler/audit/advisory.rb +142 -0
- data/lib/bundler/audit/cli.rb +124 -0
- data/lib/bundler/audit/database.rb +187 -0
- data/lib/bundler/audit/scanner.rb +97 -0
- data/lib/bundler/audit/version.rb +25 -0
- data/mrjoy-bundler-audit.gemspec +66 -0
- data/spec/advisory_spec.rb +145 -0
- data/spec/audit_spec.rb +8 -0
- data/spec/bundle/insecure_sources/Gemfile +39 -0
- data/spec/bundle/secure/Gemfile +38 -0
- data/spec/bundle/unpatched_gems/Gemfile +38 -0
- data/spec/database_spec.rb +81 -0
- data/spec/integration_spec.rb +81 -0
- data/spec/scanner_spec.rb +74 -0
- data/spec/spec_helper.rb +21 -0
- metadata +162 -0
@@ -0,0 +1,20 @@
|
|
1
|
+
---
|
2
|
+
gem: devise
|
3
|
+
cve: 2013-0233
|
4
|
+
osvdb: 89642
|
5
|
+
url: http://osvdb.org/show/osvdb/89642
|
6
|
+
title: Devise Database Type Conversion Crafted Request Parsing Security Bypass
|
7
|
+
date: 2013-01-28
|
8
|
+
|
9
|
+
description: |
|
10
|
+
Devise contains a flaw that is triggered during when a type conversion error
|
11
|
+
occurs during the parsing of a malformed request. With a specially crafted
|
12
|
+
request, a remote attacker can bypass security restrictions.
|
13
|
+
|
14
|
+
cvss_v2: 10.0
|
15
|
+
|
16
|
+
patched_versions:
|
17
|
+
- ~> 1.5.4
|
18
|
+
- ~> 2.0.5
|
19
|
+
- ~> 2.1.3
|
20
|
+
- ">= 2.2.3"
|
@@ -0,0 +1,19 @@
|
|
1
|
+
---
|
2
|
+
gem: dragonfly
|
3
|
+
cve: 2013-1756
|
4
|
+
osvdb: 90647
|
5
|
+
url: http://www.osvdb.com/show/osvdb/90647
|
6
|
+
title: Dragonfly Gem Remote Code Execution
|
7
|
+
date: 2013-02-19
|
8
|
+
|
9
|
+
description: |
|
10
|
+
The Dragonfly gem contains a flaw that allows an attacker to run arbitrary code
|
11
|
+
on a host machine using carefully crafted requests.
|
12
|
+
|
13
|
+
cvss_v2:
|
14
|
+
|
15
|
+
patched_versions:
|
16
|
+
- ">= 0.9.13"
|
17
|
+
|
18
|
+
unaffected_versions:
|
19
|
+
- "< 0.7.0"
|
@@ -0,0 +1,9 @@
|
|
1
|
+
---
|
2
|
+
gem: enum_column3
|
3
|
+
osvdb: 94679
|
4
|
+
url: http://osvdb.org/show/osvdb/94679
|
5
|
+
title: enum_column3 Gem for Ruby Symbol Creation Remote DoS
|
6
|
+
date: 2013-06-26
|
7
|
+
description: The enum_column3 Gem for Ruby contains a flaw that may allow a remote denial of service. The issue is due to the program typecasting unexpected strings to symbols. This may allow a remote attacker to crash the program.
|
8
|
+
cvss_v2:
|
9
|
+
patched_versions:
|
@@ -0,0 +1,18 @@
|
|
1
|
+
---
|
2
|
+
gem: extlib
|
3
|
+
cve: 2013-1802
|
4
|
+
osvdb: 90740
|
5
|
+
url: http://osvdb.org/show/osvdb/90740
|
6
|
+
title: extlib Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
|
7
|
+
date: 2013-01-08
|
8
|
+
|
9
|
+
description: |
|
10
|
+
extlib Gem for Ruby contains a flaw that is triggered when a type casting
|
11
|
+
error occurs during the parsing of parameters. This may allow a
|
12
|
+
context-dependent attacker to potentially execute arbitrary code.
|
13
|
+
|
14
|
+
cvss_v2: 9.3
|
15
|
+
|
16
|
+
patched_versions:
|
17
|
+
- ">= 0.9.16"
|
18
|
+
|
@@ -0,0 +1,12 @@
|
|
1
|
+
---
|
2
|
+
gem: fastreader
|
3
|
+
cve: 2013-1876
|
4
|
+
osvdb: 91232
|
5
|
+
url: http://osvdb.org/show/osvdb/91232
|
6
|
+
title: fastreader Gem for Ruby URI Handling Arbitrary Command Injection
|
7
|
+
date: 2013-03-13
|
8
|
+
|
9
|
+
description: fastreader Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.
|
10
|
+
|
11
|
+
cvss_v2: 9.3
|
12
|
+
|
@@ -0,0 +1,10 @@
|
|
1
|
+
---
|
2
|
+
gem: fileutils
|
3
|
+
cve:
|
4
|
+
osvdb: 90715
|
5
|
+
url: http://osvdb.org/show/osvdb/90715
|
6
|
+
title: fileutils Gem for Ruby files_utils.rb /tmp File Symlink Arbitrary File Overwrite
|
7
|
+
date: 2013-02-28
|
8
|
+
description: fileutils Gem for Ruby contains a flaw as the program creates temporary files insecurely. It is possible for a local attacker to use a symlink attack against temporary files created by files_utils.rb to cause the program to unexpectedly overwrite an arbitrary file.
|
9
|
+
cvss_v2:
|
10
|
+
patched_versions:
|
@@ -0,0 +1,10 @@
|
|
1
|
+
---
|
2
|
+
gem: fileutils
|
3
|
+
cve:
|
4
|
+
osvdb: 90716
|
5
|
+
url: http://osvdb.org/show/osvdb/90716
|
6
|
+
title: fileutils Gem for Ruby Temporary Directory Hijacking Weakness
|
7
|
+
date: 2013-02-28
|
8
|
+
description: fileutils Gem for Ruby contains a flaw that is due to the program not verifying the existence of a directory before attempting to create it. This may allow a local attacker to create the directory in advance, thus owning any files subsequently written to it.
|
9
|
+
cvss_v2:
|
10
|
+
patched_versions:
|
@@ -0,0 +1,10 @@
|
|
1
|
+
---
|
2
|
+
gem: fileutils
|
3
|
+
cve: 2013-2516
|
4
|
+
osvdb: 90717
|
5
|
+
url: http://osvdb.org/show/osvdb/90717
|
6
|
+
title: fileutils Gem for Ruby file_utils.rb Crafted URL Handling Remote Command Execution
|
7
|
+
date: 2013-02-28
|
8
|
+
description: fileutils Gem for Ruby contains a flaw in file_utils.rb. The issue is triggered when handling a specially crafted URL containing a command after a delimiter (;). This may allow a remote attacker to potentially execute arbitrary commands.
|
9
|
+
cvss_v2:
|
10
|
+
patched_versions:
|
@@ -0,0 +1,9 @@
|
|
1
|
+
---
|
2
|
+
gem: flash_tool
|
3
|
+
cve: 2013-2513
|
4
|
+
osvdb: 90829
|
5
|
+
url: http://osvdb.org/show/osvdb/90829
|
6
|
+
title: flash_tool Gem for Ruby File Download Handling Arbitrary Command Execution
|
7
|
+
date: 2013-03-04
|
8
|
+
description: flash_tool Gem for Ruby contains a flaw that is triggered during the handling of downloaded files that contain shell characters. With a specially crafted file, a context-dependent attacker can execute arbitrary commands.
|
9
|
+
cvss_v2:
|
@@ -0,0 +1,18 @@
|
|
1
|
+
---
|
2
|
+
gem: ftpd
|
3
|
+
cve: 2013-2512
|
4
|
+
osvdb: 90784
|
5
|
+
url: http://osvdb.org/show/osvdb/90784
|
6
|
+
title: ftpd Gem for Ruby Shell Character Handling Remote Command Injection
|
7
|
+
date: 2013-02-28
|
8
|
+
|
9
|
+
description: |
|
10
|
+
ftpd Gem for Ruby contains a flaw that is triggered when handling a
|
11
|
+
specially crafted option or filename that contains a shell
|
12
|
+
character. This may allow a remote attacker to inject arbitrary
|
13
|
+
commands.
|
14
|
+
|
15
|
+
cvss_v2: 9.0
|
16
|
+
|
17
|
+
patched_versions:
|
18
|
+
- ">= 0.2.2"
|
@@ -0,0 +1,20 @@
|
|
1
|
+
---
|
2
|
+
gem: gtk2
|
3
|
+
cve: 2007-6183
|
4
|
+
osvdb: 40774
|
5
|
+
url: http://osvdb.org/show/osvdb/40774
|
6
|
+
title:
|
7
|
+
Ruby-GNOME2 gtk/src/rbgtkmessagedialog.c Gtk::MessageDialog.new() Function
|
8
|
+
Format String
|
9
|
+
date: 2007-11-27
|
10
|
+
|
11
|
+
description: |
|
12
|
+
Format string vulnerability in the mdiag_initialize function in
|
13
|
+
gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and
|
14
|
+
SVN versions before 20071127, allows context-dependent attackers to execute
|
15
|
+
arbitrary code via format string specifiers in the message parameter.
|
16
|
+
|
17
|
+
cvss_v2: 6.8
|
18
|
+
|
19
|
+
patched_versions:
|
20
|
+
- "> 0.16.0"
|
@@ -0,0 +1,19 @@
|
|
1
|
+
---
|
2
|
+
gem: httparty
|
3
|
+
cve: 2013-1802
|
4
|
+
osvdb: 90741
|
5
|
+
url: http://osvdb.org/show/osvdb/90741
|
6
|
+
title:
|
7
|
+
httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
|
8
|
+
date: 2013-01-14
|
9
|
+
|
10
|
+
description: |
|
11
|
+
httparty Gem for Ruby contains a flaw that is triggered when a type casting
|
12
|
+
error occurs during the parsing of parameters. This may allow a
|
13
|
+
context-dependent attacker to potentially execute arbitrary code.
|
14
|
+
|
15
|
+
cvss_v2: 9.3
|
16
|
+
|
17
|
+
patched_versions:
|
18
|
+
- ">= 0.10.0"
|
19
|
+
|
@@ -0,0 +1,23 @@
|
|
1
|
+
---
|
2
|
+
gem: json
|
3
|
+
cve: 2013-0269
|
4
|
+
osvdb: 90074
|
5
|
+
url: http://direct.osvdb.org/show/osvdb/90074
|
6
|
+
title: Ruby on Rails JSON Gem Arbitrary Symbol Creation Remote DoS
|
7
|
+
date: 2013-02-11
|
8
|
+
|
9
|
+
description: |
|
10
|
+
Ruby on Rails contains a flaw that may allow a remote denial of service.
|
11
|
+
The issue is due to the JSON gem being tricked in to generating Ruby symbols
|
12
|
+
during the parsing of certain JSON documents. Since Ruby symbols are not
|
13
|
+
garbage collected, a remote attacker can crash a users system. This also may
|
14
|
+
allow the attacker to create arbitrary objects that may be used to bypass
|
15
|
+
certain security mechanisms and potentially allow SQL injection attacks to
|
16
|
+
be conducted.
|
17
|
+
|
18
|
+
cvss_v2: 9.0
|
19
|
+
|
20
|
+
patched_versions:
|
21
|
+
- ~> 1.5.5
|
22
|
+
- ~> 1.6.8
|
23
|
+
- ">= 1.7.7"
|
@@ -0,0 +1,10 @@
|
|
1
|
+
---
|
2
|
+
gem: karteek-docsplit
|
3
|
+
cve: 2013-1933
|
4
|
+
osvdb: 92117
|
5
|
+
url: http://osvdb.org/show/osvdb/92117
|
6
|
+
title: Karteek Docsplit Gem for Ruby text_extractor.rb File Name Shell Metacharacter Injection Arbitrary Command Execution
|
7
|
+
date: 2013-04-08
|
8
|
+
description: Karteek Docsplit Gem for Ruby contains a flaw that is due to the program failing to properly sanitize input passed to text_extractor.rb. With a specially crafted file name that contains shell metacharacters, a context-dependent attacker can execute arbitrary commands
|
9
|
+
cvss_v2: 9.3
|
10
|
+
patched_versions:
|
@@ -0,0 +1,10 @@
|
|
1
|
+
---
|
2
|
+
gem: kelredd-pruview
|
3
|
+
cve: 2013-1947
|
4
|
+
osvdb: 92228
|
5
|
+
url: http://osvdb.org/show/osvdb/92228
|
6
|
+
title: kelredd-pruview Gem for Ruby /lib/pruview/document.rb File Name Shell Metacharacter Injection Arbitrary Command Execution
|
7
|
+
date: 2013-04-04
|
8
|
+
description: kelredd-pruview Gem for Ruby contains a flaw in /lib/pruview/document.rb. The issue is triggered during the handling of a specially crafted file name that contains injected shell metacharacters. This may allow a context-dependent attacker to potentially execute arbitrary commands.
|
9
|
+
cvss_v2: 9.3
|
10
|
+
patched_versions:
|
@@ -0,0 +1,10 @@
|
|
1
|
+
---
|
2
|
+
gem: ldoce
|
3
|
+
cve: 2013-1911
|
4
|
+
osvdb: 91870
|
5
|
+
url: http://osvdb.org/show/osvdb/91870
|
6
|
+
title: ldoce Gem for Ruby MP3 URL Shell Metacharacter Injection Arbitrary Command Execution
|
7
|
+
date: 2013-04-01
|
8
|
+
description: ldoce Gem for Ruby contains a flaw that is triggered during the handling of a specially crafted URL or filename for MP3 files that have shell metacharacters injected in to it. This may allow a context-dependent attacker to execute arbitrary commands.
|
9
|
+
cvss_v2: 6.8
|
10
|
+
patched_versions:
|
@@ -0,0 +1,21 @@
|
|
1
|
+
---
|
2
|
+
gem: loofah
|
3
|
+
osvdb: 90945
|
4
|
+
url: http://www.osvdb.org/show/osvdb/90945
|
5
|
+
title: Loofah HTML and XSS injection vulnerability
|
6
|
+
date: 2012-09-08
|
7
|
+
|
8
|
+
description: |
|
9
|
+
Loofah Gem for Ruby contains a flaw that allows a remote cross-site
|
10
|
+
scripting (XSS) attack. This flaw exists because the
|
11
|
+
Loofah::HTML::Document\#text function passes properly sanitized
|
12
|
+
user-supplied input to the Loofah::XssFoliate and
|
13
|
+
Loofah::Helpers\#strip_tags functions which convert input back to
|
14
|
+
text. This may allow an attacker to create a specially crafted
|
15
|
+
request that would execute arbitrary script code in a user's browser
|
16
|
+
within the trust relationship between their browser and the server.
|
17
|
+
|
18
|
+
cvss_v2: 5.0
|
19
|
+
|
20
|
+
patched_versions:
|
21
|
+
- ">= 0.4.6"
|
@@ -0,0 +1,21 @@
|
|
1
|
+
---
|
2
|
+
gem: mail
|
3
|
+
cve: 2011-0739
|
4
|
+
osvdb: 70667
|
5
|
+
url: http://www.osvdb.org/show/osvdb/70667
|
6
|
+
title: >
|
7
|
+
Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb Email From:
|
8
|
+
Address Arbitrary Shell Command Injection
|
9
|
+
date: 2011-01-25
|
10
|
+
|
11
|
+
description: |
|
12
|
+
Mail Gem for Ruby contains a flaw related to the failure to properly sanitise
|
13
|
+
input passed from an email from address in the 'deliver()' function in
|
14
|
+
'lib/mail/network/delivery_methods/sendmail.rb' before being used as a
|
15
|
+
command line argument. This may allow a remote attacker to inject arbitrary
|
16
|
+
shell commands.
|
17
|
+
|
18
|
+
cvss_v2: 6.8
|
19
|
+
|
20
|
+
patched_versions:
|
21
|
+
- ">= 2.2.15"
|
@@ -0,0 +1,14 @@
|
|
1
|
+
---
|
2
|
+
gem: mail
|
3
|
+
cve: 2012-2139
|
4
|
+
osvdb: 81631
|
5
|
+
url: http://www.osvdb.org/show/osvdb/81631
|
6
|
+
title: Mail Gem for Ruby File Delivery Method to Parameter Traversal Arbitrary File Manipulation
|
7
|
+
date: 2012-03-14
|
8
|
+
|
9
|
+
description: |
|
10
|
+
Mail Gem for Ruby contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the 'to' parameter within the delivery method. This directory traversal attack would allow the attacker to modify arbitrary files.
|
11
|
+
|
12
|
+
cvss_v2: 5.0
|
13
|
+
patched_versions:
|
14
|
+
- ">= 2.4.4"
|
@@ -0,0 +1,16 @@
|
|
1
|
+
---
|
2
|
+
gem: mail
|
3
|
+
cve: 2012-2140
|
4
|
+
osvdb: 81632
|
5
|
+
url: http://www.osvdb.org/show/osvdb/81632
|
6
|
+
title: Mail Gem for Ruby Multiple Delivery Method Remote Shell Command Execution
|
7
|
+
date: 2012-03-14
|
8
|
+
|
9
|
+
description: |
|
10
|
+
Mail Gem for Ruby contains a flaw that occurs within the sendmail and exim
|
11
|
+
delivery methods, which may allow an attacker to execute arbitrary shell
|
12
|
+
commands..
|
13
|
+
|
14
|
+
cvss_v2: 7.5
|
15
|
+
patched_versions:
|
16
|
+
- ">= 2.4.4"
|
@@ -0,0 +1,10 @@
|
|
1
|
+
---
|
2
|
+
gem: md2pdf
|
3
|
+
cve: 2013-1948
|
4
|
+
osvdb: 92290
|
5
|
+
url: http://osvdb.org/show/osvdb/92290
|
6
|
+
title: md2pdf Gem for Ruby md2pdf/converter.rb File Name Shell Metacharacter Injection Arbitrary Command Execution
|
7
|
+
date: 2013-04-13
|
8
|
+
description: md2pdf Gem for Ruby contains a flaw that is due to the program failing to properly sanitize input passed to md2pdf/converter.rb. With a specially crafted file name that contains shell metacharacters, a context-dependent attacker can execute arbitrary commands
|
9
|
+
cvss_v2: 10.0
|
10
|
+
patched_versions:
|
@@ -0,0 +1,15 @@
|
|
1
|
+
---
|
2
|
+
gem: mini_magick
|
3
|
+
cve: 2013-2616
|
4
|
+
osvdb: 91231
|
5
|
+
url: http://osvdb.org/show/osvdb/91231
|
6
|
+
title: MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection
|
7
|
+
date: 2013-03-12
|
8
|
+
|
9
|
+
description: MiniMagick Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input from an untrusted source passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.
|
10
|
+
|
11
|
+
cvss_v2: 9.3
|
12
|
+
|
13
|
+
patched_versions:
|
14
|
+
- ">= 3.6.0"
|
15
|
+
|
@@ -0,0 +1,16 @@
|
|
1
|
+
---
|
2
|
+
gem: multi_xml
|
3
|
+
cve: 2013-0175
|
4
|
+
osvdb: 89148
|
5
|
+
url: http://osvdb.org/show/osvdb/89148
|
6
|
+
title: multi_xml Gem for Ruby XML Parameter Parsing Remote Command Execution
|
7
|
+
date: 2013-01-11
|
8
|
+
|
9
|
+
description: |
|
10
|
+
The multi_xml Gem for Ruby contains a flaw that is triggered when an error
|
11
|
+
occurs during the parsing of the 'XML' parameter. With a crafted request
|
12
|
+
containing arbitrary symbol and yaml types, a remote attacker can execute
|
13
|
+
arbitrary commands.
|
14
|
+
|
15
|
+
patched_versions:
|
16
|
+
- ">= 0.5.2"
|
@@ -0,0 +1,17 @@
|
|
1
|
+
---
|
2
|
+
gem: newrelic_rpm
|
3
|
+
cve: 2013-0284
|
4
|
+
osvdb: 90189
|
5
|
+
url: http://osvdb.org/show/osvdb/90189
|
6
|
+
title: Ruby on Rails newrelic_rpm Gem Discloses Sensitive Information
|
7
|
+
date: 2012-12-06
|
8
|
+
|
9
|
+
description: |
|
10
|
+
A bug in the Ruby agent causes database connection information and raw SQL
|
11
|
+
statements to be transmitted to New Relic servers. The database connection
|
12
|
+
information includes the database IP address, username, and password
|
13
|
+
|
14
|
+
cvss_v2: 5.0
|
15
|
+
|
16
|
+
patched_versions:
|
17
|
+
- ">= 3.5.3.25"
|
@@ -0,0 +1,19 @@
|
|
1
|
+
---
|
2
|
+
gem: nori
|
3
|
+
cve: 2013-0285
|
4
|
+
osvdb: 90196
|
5
|
+
url: http://osvdb.org/show/osvdb/90196
|
6
|
+
title: Ruby Gem nori Parameter Parsing Remote Code Execution
|
7
|
+
date: 2013-01-10
|
8
|
+
|
9
|
+
description: |
|
10
|
+
The Ruby Gem nori has a parameter parsing error that may allow an attacker
|
11
|
+
to execute arbitrary code. This vulnerability has to do with type casting
|
12
|
+
during parsing, and is related to CVE-2013-0156.
|
13
|
+
|
14
|
+
cvss_v2: 10.0
|
15
|
+
|
16
|
+
patched_versions:
|
17
|
+
- ~> 1.0.3
|
18
|
+
- ~> 1.1.4
|
19
|
+
- ">= 2.0.2"
|
@@ -0,0 +1,16 @@
|
|
1
|
+
---
|
2
|
+
gem: omniauth-oauth2
|
3
|
+
cve: 2012-6134
|
4
|
+
osvdb: 90264
|
5
|
+
url: http://www.osvdb.org/show/osvdb/90264
|
6
|
+
title: Ruby on Rails omniauth-oauth2 Gem CSRF vulnerability
|
7
|
+
date: 2012-09-08
|
8
|
+
|
9
|
+
description: |
|
10
|
+
The omniauth-oauth2 Ruby Gem contains a flaw that allows an attacker to
|
11
|
+
inject values into a user's session through a CSRF attack.
|
12
|
+
|
13
|
+
cvss_v2: 6.8
|
14
|
+
|
15
|
+
patched_versions:
|
16
|
+
- ">= 1.1.1"
|