mrjoy-bundler-audit 0.1.4

Sign up to get free protection for your applications and to get access to all the features.
Files changed (100) hide show
  1. checksums.yaml +7 -0
  2. data/.document +3 -0
  3. data/.gitignore +6 -0
  4. data/.gitmodules +3 -0
  5. data/.rspec +1 -0
  6. data/.travis.yml +5 -0
  7. data/.yardopts +1 -0
  8. data/COPYING.txt +674 -0
  9. data/ChangeLog.md +79 -0
  10. data/Gemfile +14 -0
  11. data/README.md +105 -0
  12. data/Rakefile +47 -0
  13. data/bin/bundle-audit +10 -0
  14. data/data/ruby-advisory-db/.rspec +1 -0
  15. data/data/ruby-advisory-db/CONTRIBUTING.md +6 -0
  16. data/data/ruby-advisory-db/CONTRIBUTORS.md +13 -0
  17. data/data/ruby-advisory-db/Gemfile +3 -0
  18. data/data/ruby-advisory-db/LICENSE.txt +5 -0
  19. data/data/ruby-advisory-db/README.md +86 -0
  20. data/data/ruby-advisory-db/Rakefile +27 -0
  21. data/data/ruby-advisory-db/gems/actionpack/OSVDB-79727.yml +26 -0
  22. data/data/ruby-advisory-db/gems/actionpack/OSVDB-84243.yml +28 -0
  23. data/data/ruby-advisory-db/gems/actionpack/OSVDB-84513.yml +23 -0
  24. data/data/ruby-advisory-db/gems/actionpack/OSVDB-84515.yml +26 -0
  25. data/data/ruby-advisory-db/gems/actionpack/OSVDB-89026.yml +24 -0
  26. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +20 -0
  27. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +23 -0
  28. data/data/ruby-advisory-db/gems/activerecord/OSVDB-82403.yml +25 -0
  29. data/data/ruby-advisory-db/gems/activerecord/OSVDB-82610.yml +24 -0
  30. data/data/ruby-advisory-db/gems/activerecord/OSVDB-89025.yml +24 -0
  31. data/data/ruby-advisory-db/gems/activerecord/OSVDB-90072.yml +21 -0
  32. data/data/ruby-advisory-db/gems/activerecord/OSVDB-90073.yml +23 -0
  33. data/data/ruby-advisory-db/gems/activerecord/OSVDB-91453.yml +26 -0
  34. data/data/ruby-advisory-db/gems/activesupport/OSVDB-79726.yml +26 -0
  35. data/data/ruby-advisory-db/gems/activesupport/OSVDB-84516.yml +23 -0
  36. data/data/ruby-advisory-db/gems/activesupport/OSVDB-89594.yml +25 -0
  37. data/data/ruby-advisory-db/gems/activesupport/OSVDB-91451.yml +28 -0
  38. data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +10 -0
  39. data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +17 -0
  40. data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +11 -0
  41. data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +12 -0
  42. data/data/ruby-advisory-db/gems/devise/OSVDB-89642.yml +20 -0
  43. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +19 -0
  44. data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +9 -0
  45. data/data/ruby-advisory-db/gems/extlib/OSVDB-90740.yml +18 -0
  46. data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +12 -0
  47. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +10 -0
  48. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +10 -0
  49. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +10 -0
  50. data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +9 -0
  51. data/data/ruby-advisory-db/gems/ftpd/OSVDB-90784.yml +18 -0
  52. data/data/ruby-advisory-db/gems/gtk2/OSVDB-40774.yml +20 -0
  53. data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +19 -0
  54. data/data/ruby-advisory-db/gems/json/OSVDB-90074.yml +23 -0
  55. data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +10 -0
  56. data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +10 -0
  57. data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +10 -0
  58. data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +21 -0
  59. data/data/ruby-advisory-db/gems/mail/OSVDB-70667.yml +21 -0
  60. data/data/ruby-advisory-db/gems/mail/OSVDB-81631.yml +14 -0
  61. data/data/ruby-advisory-db/gems/mail/OSVDB-81632.yml +16 -0
  62. data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +10 -0
  63. data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +15 -0
  64. data/data/ruby-advisory-db/gems/multi_xml/OSVDB-89148.yml +16 -0
  65. data/data/ruby-advisory-db/gems/newrelic_rpm/OSVDB-90189.yml +17 -0
  66. data/data/ruby-advisory-db/gems/nori/OSVDB-90196.yml +19 -0
  67. data/data/ruby-advisory-db/gems/omniauth-oauth2/OSVDB-90264.yml +16 -0
  68. data/data/ruby-advisory-db/gems/pdfkit/OSVDB-90867.yml +11 -0
  69. data/data/ruby-advisory-db/gems/rack-cache/OSVDB-83077.yml +18 -0
  70. data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +23 -0
  71. data/data/ruby-advisory-db/gems/rdoc/OSVDB-90004.yml +27 -0
  72. data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +13 -0
  73. data/data/ruby-advisory-db/gems/ruby_parser/OSVDB-90561.yml +11 -0
  74. data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +10 -0
  75. data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +10 -0
  76. data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +10 -0
  77. data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +10 -0
  78. data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +10 -0
  79. data/data/ruby-advisory-db/lib/scrape.rb +87 -0
  80. data/data/ruby-advisory-db/spec/advisory_example.rb +165 -0
  81. data/data/ruby-advisory-db/spec/gems_spec.rb +8 -0
  82. data/data/ruby-advisory-db/spec/spec_helper.rb +1 -0
  83. data/gemspec.yml +16 -0
  84. data/lib/bundler/audit.rb +21 -0
  85. data/lib/bundler/audit/advisory.rb +142 -0
  86. data/lib/bundler/audit/cli.rb +124 -0
  87. data/lib/bundler/audit/database.rb +187 -0
  88. data/lib/bundler/audit/scanner.rb +97 -0
  89. data/lib/bundler/audit/version.rb +25 -0
  90. data/mrjoy-bundler-audit.gemspec +66 -0
  91. data/spec/advisory_spec.rb +145 -0
  92. data/spec/audit_spec.rb +8 -0
  93. data/spec/bundle/insecure_sources/Gemfile +39 -0
  94. data/spec/bundle/secure/Gemfile +38 -0
  95. data/spec/bundle/unpatched_gems/Gemfile +38 -0
  96. data/spec/database_spec.rb +81 -0
  97. data/spec/integration_spec.rb +81 -0
  98. data/spec/scanner_spec.rb +74 -0
  99. data/spec/spec_helper.rb +21 -0
  100. metadata +162 -0
@@ -0,0 +1,20 @@
1
+ ---
2
+ gem: devise
3
+ cve: 2013-0233
4
+ osvdb: 89642
5
+ url: http://osvdb.org/show/osvdb/89642
6
+ title: Devise Database Type Conversion Crafted Request Parsing Security Bypass
7
+ date: 2013-01-28
8
+
9
+ description: |
10
+ Devise contains a flaw that is triggered during when a type conversion error
11
+ occurs during the parsing of a malformed request. With a specially crafted
12
+ request, a remote attacker can bypass security restrictions.
13
+
14
+ cvss_v2: 10.0
15
+
16
+ patched_versions:
17
+ - ~> 1.5.4
18
+ - ~> 2.0.5
19
+ - ~> 2.1.3
20
+ - ">= 2.2.3"
@@ -0,0 +1,19 @@
1
+ ---
2
+ gem: dragonfly
3
+ cve: 2013-1756
4
+ osvdb: 90647
5
+ url: http://www.osvdb.com/show/osvdb/90647
6
+ title: Dragonfly Gem Remote Code Execution
7
+ date: 2013-02-19
8
+
9
+ description: |
10
+ The Dragonfly gem contains a flaw that allows an attacker to run arbitrary code
11
+ on a host machine using carefully crafted requests.
12
+
13
+ cvss_v2:
14
+
15
+ patched_versions:
16
+ - ">= 0.9.13"
17
+
18
+ unaffected_versions:
19
+ - "< 0.7.0"
@@ -0,0 +1,9 @@
1
+ ---
2
+ gem: enum_column3
3
+ osvdb: 94679
4
+ url: http://osvdb.org/show/osvdb/94679
5
+ title: enum_column3 Gem for Ruby Symbol Creation Remote DoS
6
+ date: 2013-06-26
7
+ description: The enum_column3 Gem for Ruby contains a flaw that may allow a remote denial of service. The issue is due to the program typecasting unexpected strings to symbols. This may allow a remote attacker to crash the program.
8
+ cvss_v2:
9
+ patched_versions:
@@ -0,0 +1,18 @@
1
+ ---
2
+ gem: extlib
3
+ cve: 2013-1802
4
+ osvdb: 90740
5
+ url: http://osvdb.org/show/osvdb/90740
6
+ title: extlib Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
7
+ date: 2013-01-08
8
+
9
+ description: |
10
+ extlib Gem for Ruby contains a flaw that is triggered when a type casting
11
+ error occurs during the parsing of parameters. This may allow a
12
+ context-dependent attacker to potentially execute arbitrary code.
13
+
14
+ cvss_v2: 9.3
15
+
16
+ patched_versions:
17
+ - ">= 0.9.16"
18
+
@@ -0,0 +1,12 @@
1
+ ---
2
+ gem: fastreader
3
+ cve: 2013-1876
4
+ osvdb: 91232
5
+ url: http://osvdb.org/show/osvdb/91232
6
+ title: fastreader Gem for Ruby URI Handling Arbitrary Command Injection
7
+ date: 2013-03-13
8
+
9
+ description: fastreader Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.
10
+
11
+ cvss_v2: 9.3
12
+
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: fileutils
3
+ cve:
4
+ osvdb: 90715
5
+ url: http://osvdb.org/show/osvdb/90715
6
+ title: fileutils Gem for Ruby files_utils.rb /tmp File Symlink Arbitrary File Overwrite
7
+ date: 2013-02-28
8
+ description: fileutils Gem for Ruby contains a flaw as the program creates temporary files insecurely. It is possible for a local attacker to use a symlink attack against temporary files created by files_utils.rb to cause the program to unexpectedly overwrite an arbitrary file.
9
+ cvss_v2:
10
+ patched_versions:
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: fileutils
3
+ cve:
4
+ osvdb: 90716
5
+ url: http://osvdb.org/show/osvdb/90716
6
+ title: fileutils Gem for Ruby Temporary Directory Hijacking Weakness
7
+ date: 2013-02-28
8
+ description: fileutils Gem for Ruby contains a flaw that is due to the program not verifying the existence of a directory before attempting to create it. This may allow a local attacker to create the directory in advance, thus owning any files subsequently written to it.
9
+ cvss_v2:
10
+ patched_versions:
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: fileutils
3
+ cve: 2013-2516
4
+ osvdb: 90717
5
+ url: http://osvdb.org/show/osvdb/90717
6
+ title: fileutils Gem for Ruby file_utils.rb Crafted URL Handling Remote Command Execution
7
+ date: 2013-02-28
8
+ description: fileutils Gem for Ruby contains a flaw in file_utils.rb. The issue is triggered when handling a specially crafted URL containing a command after a delimiter (;). This may allow a remote attacker to potentially execute arbitrary commands.
9
+ cvss_v2:
10
+ patched_versions:
@@ -0,0 +1,9 @@
1
+ ---
2
+ gem: flash_tool
3
+ cve: 2013-2513
4
+ osvdb: 90829
5
+ url: http://osvdb.org/show/osvdb/90829
6
+ title: flash_tool Gem for Ruby File Download Handling Arbitrary Command Execution
7
+ date: 2013-03-04
8
+ description: flash_tool Gem for Ruby contains a flaw that is triggered during the handling of downloaded files that contain shell characters. With a specially crafted file, a context-dependent attacker can execute arbitrary commands.
9
+ cvss_v2:
@@ -0,0 +1,18 @@
1
+ ---
2
+ gem: ftpd
3
+ cve: 2013-2512
4
+ osvdb: 90784
5
+ url: http://osvdb.org/show/osvdb/90784
6
+ title: ftpd Gem for Ruby Shell Character Handling Remote Command Injection
7
+ date: 2013-02-28
8
+
9
+ description: |
10
+ ftpd Gem for Ruby contains a flaw that is triggered when handling a
11
+ specially crafted option or filename that contains a shell
12
+ character. This may allow a remote attacker to inject arbitrary
13
+ commands.
14
+
15
+ cvss_v2: 9.0
16
+
17
+ patched_versions:
18
+ - ">= 0.2.2"
@@ -0,0 +1,20 @@
1
+ ---
2
+ gem: gtk2
3
+ cve: 2007-6183
4
+ osvdb: 40774
5
+ url: http://osvdb.org/show/osvdb/40774
6
+ title:
7
+ Ruby-GNOME2 gtk/src/rbgtkmessagedialog.c Gtk::MessageDialog.new() Function
8
+ Format String
9
+ date: 2007-11-27
10
+
11
+ description: |
12
+ Format string vulnerability in the mdiag_initialize function in
13
+ gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and
14
+ SVN versions before 20071127, allows context-dependent attackers to execute
15
+ arbitrary code via format string specifiers in the message parameter.
16
+
17
+ cvss_v2: 6.8
18
+
19
+ patched_versions:
20
+ - "> 0.16.0"
@@ -0,0 +1,19 @@
1
+ ---
2
+ gem: httparty
3
+ cve: 2013-1802
4
+ osvdb: 90741
5
+ url: http://osvdb.org/show/osvdb/90741
6
+ title:
7
+ httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
8
+ date: 2013-01-14
9
+
10
+ description: |
11
+ httparty Gem for Ruby contains a flaw that is triggered when a type casting
12
+ error occurs during the parsing of parameters. This may allow a
13
+ context-dependent attacker to potentially execute arbitrary code.
14
+
15
+ cvss_v2: 9.3
16
+
17
+ patched_versions:
18
+ - ">= 0.10.0"
19
+
@@ -0,0 +1,23 @@
1
+ ---
2
+ gem: json
3
+ cve: 2013-0269
4
+ osvdb: 90074
5
+ url: http://direct.osvdb.org/show/osvdb/90074
6
+ title: Ruby on Rails JSON Gem Arbitrary Symbol Creation Remote DoS
7
+ date: 2013-02-11
8
+
9
+ description: |
10
+ Ruby on Rails contains a flaw that may allow a remote denial of service.
11
+ The issue is due to the JSON gem being tricked in to generating Ruby symbols
12
+ during the parsing of certain JSON documents. Since Ruby symbols are not
13
+ garbage collected, a remote attacker can crash a users system. This also may
14
+ allow the attacker to create arbitrary objects that may be used to bypass
15
+ certain security mechanisms and potentially allow SQL injection attacks to
16
+ be conducted.
17
+
18
+ cvss_v2: 9.0
19
+
20
+ patched_versions:
21
+ - ~> 1.5.5
22
+ - ~> 1.6.8
23
+ - ">= 1.7.7"
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: karteek-docsplit
3
+ cve: 2013-1933
4
+ osvdb: 92117
5
+ url: http://osvdb.org/show/osvdb/92117
6
+ title: Karteek Docsplit Gem for Ruby text_extractor.rb File Name Shell Metacharacter Injection Arbitrary Command Execution
7
+ date: 2013-04-08
8
+ description: Karteek Docsplit Gem for Ruby contains a flaw that is due to the program failing to properly sanitize input passed to text_extractor.rb. With a specially crafted file name that contains shell metacharacters, a context-dependent attacker can execute arbitrary commands
9
+ cvss_v2: 9.3
10
+ patched_versions:
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: kelredd-pruview
3
+ cve: 2013-1947
4
+ osvdb: 92228
5
+ url: http://osvdb.org/show/osvdb/92228
6
+ title: kelredd-pruview Gem for Ruby /lib/pruview/document.rb File Name Shell Metacharacter Injection Arbitrary Command Execution
7
+ date: 2013-04-04
8
+ description: kelredd-pruview Gem for Ruby contains a flaw in /lib/pruview/document.rb. The issue is triggered during the handling of a specially crafted file name that contains injected shell metacharacters. This may allow a context-dependent attacker to potentially execute arbitrary commands.
9
+ cvss_v2: 9.3
10
+ patched_versions:
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: ldoce
3
+ cve: 2013-1911
4
+ osvdb: 91870
5
+ url: http://osvdb.org/show/osvdb/91870
6
+ title: ldoce Gem for Ruby MP3 URL Shell Metacharacter Injection Arbitrary Command Execution
7
+ date: 2013-04-01
8
+ description: ldoce Gem for Ruby contains a flaw that is triggered during the handling of a specially crafted URL or filename for MP3 files that have shell metacharacters injected in to it. This may allow a context-dependent attacker to execute arbitrary commands.
9
+ cvss_v2: 6.8
10
+ patched_versions:
@@ -0,0 +1,21 @@
1
+ ---
2
+ gem: loofah
3
+ osvdb: 90945
4
+ url: http://www.osvdb.org/show/osvdb/90945
5
+ title: Loofah HTML and XSS injection vulnerability
6
+ date: 2012-09-08
7
+
8
+ description: |
9
+ Loofah Gem for Ruby contains a flaw that allows a remote cross-site
10
+ scripting (XSS) attack. This flaw exists because the
11
+ Loofah::HTML::Document\#text function passes properly sanitized
12
+ user-supplied input to the Loofah::XssFoliate and
13
+ Loofah::Helpers\#strip_tags functions which convert input back to
14
+ text. This may allow an attacker to create a specially crafted
15
+ request that would execute arbitrary script code in a user's browser
16
+ within the trust relationship between their browser and the server.
17
+
18
+ cvss_v2: 5.0
19
+
20
+ patched_versions:
21
+ - ">= 0.4.6"
@@ -0,0 +1,21 @@
1
+ ---
2
+ gem: mail
3
+ cve: 2011-0739
4
+ osvdb: 70667
5
+ url: http://www.osvdb.org/show/osvdb/70667
6
+ title: >
7
+ Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb Email From:
8
+ Address Arbitrary Shell Command Injection
9
+ date: 2011-01-25
10
+
11
+ description: |
12
+ Mail Gem for Ruby contains a flaw related to the failure to properly sanitise
13
+ input passed from an email from address in the 'deliver()' function in
14
+ 'lib/mail/network/delivery_methods/sendmail.rb' before being used as a
15
+ command line argument. This may allow a remote attacker to inject arbitrary
16
+ shell commands.
17
+
18
+ cvss_v2: 6.8
19
+
20
+ patched_versions:
21
+ - ">= 2.2.15"
@@ -0,0 +1,14 @@
1
+ ---
2
+ gem: mail
3
+ cve: 2012-2139
4
+ osvdb: 81631
5
+ url: http://www.osvdb.org/show/osvdb/81631
6
+ title: Mail Gem for Ruby File Delivery Method to Parameter Traversal Arbitrary File Manipulation
7
+ date: 2012-03-14
8
+
9
+ description: |
10
+ Mail Gem for Ruby contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the 'to' parameter within the delivery method. This directory traversal attack would allow the attacker to modify arbitrary files.
11
+
12
+ cvss_v2: 5.0
13
+ patched_versions:
14
+ - ">= 2.4.4"
@@ -0,0 +1,16 @@
1
+ ---
2
+ gem: mail
3
+ cve: 2012-2140
4
+ osvdb: 81632
5
+ url: http://www.osvdb.org/show/osvdb/81632
6
+ title: Mail Gem for Ruby Multiple Delivery Method Remote Shell Command Execution
7
+ date: 2012-03-14
8
+
9
+ description: |
10
+ Mail Gem for Ruby contains a flaw that occurs within the sendmail and exim
11
+ delivery methods, which may allow an attacker to execute arbitrary shell
12
+ commands..
13
+
14
+ cvss_v2: 7.5
15
+ patched_versions:
16
+ - ">= 2.4.4"
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: md2pdf
3
+ cve: 2013-1948
4
+ osvdb: 92290
5
+ url: http://osvdb.org/show/osvdb/92290
6
+ title: md2pdf Gem for Ruby md2pdf/converter.rb File Name Shell Metacharacter Injection Arbitrary Command Execution
7
+ date: 2013-04-13
8
+ description: md2pdf Gem for Ruby contains a flaw that is due to the program failing to properly sanitize input passed to md2pdf/converter.rb. With a specially crafted file name that contains shell metacharacters, a context-dependent attacker can execute arbitrary commands
9
+ cvss_v2: 10.0
10
+ patched_versions:
@@ -0,0 +1,15 @@
1
+ ---
2
+ gem: mini_magick
3
+ cve: 2013-2616
4
+ osvdb: 91231
5
+ url: http://osvdb.org/show/osvdb/91231
6
+ title: MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection
7
+ date: 2013-03-12
8
+
9
+ description: MiniMagick Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input from an untrusted source passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.
10
+
11
+ cvss_v2: 9.3
12
+
13
+ patched_versions:
14
+ - ">= 3.6.0"
15
+
@@ -0,0 +1,16 @@
1
+ ---
2
+ gem: multi_xml
3
+ cve: 2013-0175
4
+ osvdb: 89148
5
+ url: http://osvdb.org/show/osvdb/89148
6
+ title: multi_xml Gem for Ruby XML Parameter Parsing Remote Command Execution
7
+ date: 2013-01-11
8
+
9
+ description: |
10
+ The multi_xml Gem for Ruby contains a flaw that is triggered when an error
11
+ occurs during the parsing of the 'XML' parameter. With a crafted request
12
+ containing arbitrary symbol and yaml types, a remote attacker can execute
13
+ arbitrary commands.
14
+
15
+ patched_versions:
16
+ - ">= 0.5.2"
@@ -0,0 +1,17 @@
1
+ ---
2
+ gem: newrelic_rpm
3
+ cve: 2013-0284
4
+ osvdb: 90189
5
+ url: http://osvdb.org/show/osvdb/90189
6
+ title: Ruby on Rails newrelic_rpm Gem Discloses Sensitive Information
7
+ date: 2012-12-06
8
+
9
+ description: |
10
+ A bug in the Ruby agent causes database connection information and raw SQL
11
+ statements to be transmitted to New Relic servers. The database connection
12
+ information includes the database IP address, username, and password
13
+
14
+ cvss_v2: 5.0
15
+
16
+ patched_versions:
17
+ - ">= 3.5.3.25"
@@ -0,0 +1,19 @@
1
+ ---
2
+ gem: nori
3
+ cve: 2013-0285
4
+ osvdb: 90196
5
+ url: http://osvdb.org/show/osvdb/90196
6
+ title: Ruby Gem nori Parameter Parsing Remote Code Execution
7
+ date: 2013-01-10
8
+
9
+ description: |
10
+ The Ruby Gem nori has a parameter parsing error that may allow an attacker
11
+ to execute arbitrary code. This vulnerability has to do with type casting
12
+ during parsing, and is related to CVE-2013-0156.
13
+
14
+ cvss_v2: 10.0
15
+
16
+ patched_versions:
17
+ - ~> 1.0.3
18
+ - ~> 1.1.4
19
+ - ">= 2.0.2"
@@ -0,0 +1,16 @@
1
+ ---
2
+ gem: omniauth-oauth2
3
+ cve: 2012-6134
4
+ osvdb: 90264
5
+ url: http://www.osvdb.org/show/osvdb/90264
6
+ title: Ruby on Rails omniauth-oauth2 Gem CSRF vulnerability
7
+ date: 2012-09-08
8
+
9
+ description: |
10
+ The omniauth-oauth2 Ruby Gem contains a flaw that allows an attacker to
11
+ inject values into a user's session through a CSRF attack.
12
+
13
+ cvss_v2: 6.8
14
+
15
+ patched_versions:
16
+ - ">= 1.1.1"