mrjoy-bundler-audit 0.3.3 → 0.3.4

Sign up to get free protection for your applications and to get access to all the features.
Files changed (121) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +1 -2
  3. data/.travis.yml +2 -0
  4. data/ChangeLog.md +10 -0
  5. data/Gemfile +1 -1
  6. data/Rakefile +12 -10
  7. data/lib/bundler/audit/cli.rb +3 -0
  8. data/lib/bundler/audit/database.rb +57 -24
  9. data/lib/bundler/audit/version.rb +1 -1
  10. data/mrjoy-bundler-audit.gemspec +0 -7
  11. data/spec/advisory_spec.rb +8 -3
  12. data/spec/bundle/insecure_sources/Gemfile.lock +98 -0
  13. data/spec/bundle/secure/Gemfile.lock +90 -0
  14. data/spec/bundle/unpatched_gems/Gemfile.lock +92 -0
  15. data/spec/bundle/wrapper.rb +36 -0
  16. data/spec/database_spec.rb +62 -42
  17. data/{data/ruby-advisory-db/gems/actionpack → spec/fixtures}/OSVDB-84243.yml +0 -0
  18. data/spec/integration_spec.rb +52 -14
  19. data/spec/spec_helper.rb +5 -45
  20. metadata +7 -104
  21. data/.gitmodules +0 -3
  22. data/data/ruby-advisory-db.ts +0 -1
  23. data/data/ruby-advisory-db/.gitignore +0 -1
  24. data/data/ruby-advisory-db/.rspec +0 -1
  25. data/data/ruby-advisory-db/CONTRIBUTING.md +0 -6
  26. data/data/ruby-advisory-db/CONTRIBUTORS.md +0 -24
  27. data/data/ruby-advisory-db/Gemfile +0 -3
  28. data/data/ruby-advisory-db/LICENSE.txt +0 -5
  29. data/data/ruby-advisory-db/README.md +0 -82
  30. data/data/ruby-advisory-db/Rakefile +0 -27
  31. data/data/ruby-advisory-db/gems/actionmailer/OSVDB-98629.yml +0 -17
  32. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +0 -20
  33. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +0 -21
  34. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +0 -27
  35. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +0 -24
  36. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +0 -22
  37. data/data/ruby-advisory-db/gems/actionpack/OSVDB-103439.yml +0 -24
  38. data/data/ruby-advisory-db/gems/actionpack/OSVDB-103440.yml +0 -22
  39. data/data/ruby-advisory-db/gems/actionpack/OSVDB-79727.yml +0 -26
  40. data/data/ruby-advisory-db/gems/actionpack/OSVDB-84513.yml +0 -23
  41. data/data/ruby-advisory-db/gems/actionpack/OSVDB-84515.yml +0 -26
  42. data/data/ruby-advisory-db/gems/actionpack/OSVDB-89026.yml +0 -24
  43. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +0 -20
  44. data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +0 -23
  45. data/data/ruby-advisory-db/gems/activerecord/OSVDB-103438.yml +0 -23
  46. data/data/ruby-advisory-db/gems/activerecord/OSVDB-82403.yml +0 -25
  47. data/data/ruby-advisory-db/gems/activerecord/OSVDB-82610.yml +0 -24
  48. data/data/ruby-advisory-db/gems/activerecord/OSVDB-89025.yml +0 -24
  49. data/data/ruby-advisory-db/gems/activerecord/OSVDB-90072.yml +0 -21
  50. data/data/ruby-advisory-db/gems/activerecord/OSVDB-90073.yml +0 -23
  51. data/data/ruby-advisory-db/gems/activerecord/OSVDB-91453.yml +0 -26
  52. data/data/ruby-advisory-db/gems/activesupport/OSVDB-79726.yml +0 -26
  53. data/data/ruby-advisory-db/gems/activesupport/OSVDB-84516.yml +0 -23
  54. data/data/ruby-advisory-db/gems/activesupport/OSVDB-89594.yml +0 -25
  55. data/data/ruby-advisory-db/gems/activesupport/OSVDB-91451.yml +0 -28
  56. data/data/ruby-advisory-db/gems/arabic-prawn/OSVDB-104365.yml +0 -15
  57. data/data/ruby-advisory-db/gems/cocaine/OSVDB-98835.yml +0 -15
  58. data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +0 -10
  59. data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +0 -17
  60. data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +0 -11
  61. data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +0 -12
  62. data/data/ruby-advisory-db/gems/devise/OSVDB-89642.yml +0 -20
  63. data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +0 -19
  64. data/data/ruby-advisory-db/gems/echor/OSVDB-102129.yml +0 -11
  65. data/data/ruby-advisory-db/gems/echor/OSVDB-102130.yml +0 -10
  66. data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +0 -9
  67. data/data/ruby-advisory-db/gems/extlib/OSVDB-90740.yml +0 -18
  68. data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +0 -12
  69. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +0 -10
  70. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +0 -10
  71. data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +0 -10
  72. data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +0 -9
  73. data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-96798.yml +0 -13
  74. data/data/ruby-advisory-db/gems/ftpd/OSVDB-90784.yml +0 -18
  75. data/data/ruby-advisory-db/gems/gitlab-grit/OSVDB-99370.yml +0 -14
  76. data/data/ruby-advisory-db/gems/gtk2/OSVDB-40774.yml +0 -20
  77. data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +0 -14
  78. data/data/ruby-advisory-db/gems/i18n/OSVDB-100528.yml +0 -17
  79. data/data/ruby-advisory-db/gems/json/OSVDB-90074.yml +0 -23
  80. data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +0 -10
  81. data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +0 -10
  82. data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +0 -10
  83. data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +0 -21
  84. data/data/ruby-advisory-db/gems/mail/OSVDB-70667.yml +0 -21
  85. data/data/ruby-advisory-db/gems/mail/OSVDB-81631.yml +0 -14
  86. data/data/ruby-advisory-db/gems/mail/OSVDB-81632.yml +0 -16
  87. data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +0 -10
  88. data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +0 -15
  89. data/data/ruby-advisory-db/gems/multi_xml/OSVDB-89148.yml +0 -16
  90. data/data/ruby-advisory-db/gems/newrelic_rpm/OSVDB-90189.yml +0 -17
  91. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101179.yml +0 -12
  92. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101458.yml +0 -15
  93. data/data/ruby-advisory-db/gems/nori/OSVDB-90196.yml +0 -19
  94. data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99693.yml +0 -22
  95. data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99888.yml +0 -17
  96. data/data/ruby-advisory-db/gems/omniauth-oauth2/OSVDB-90264.yml +0 -16
  97. data/data/ruby-advisory-db/gems/paperclip/OSVDB-103151.yml +0 -13
  98. data/data/ruby-advisory-db/gems/paratrooper-newrelic/OSVDB-101839.yml +0 -12
  99. data/data/ruby-advisory-db/gems/paratrooper-pingdom/OSVDB-101847.yml +0 -13
  100. data/data/ruby-advisory-db/gems/pdfkit/OSVDB-90867.yml +0 -11
  101. data/data/ruby-advisory-db/gems/rack-cache/OSVDB-83077.yml +0 -18
  102. data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +0 -23
  103. data/data/ruby-advisory-db/gems/rbovirt/OSVDB-104080.yml +0 -20
  104. data/data/ruby-advisory-db/gems/rdoc/OSVDB-90004.yml +0 -27
  105. data/data/ruby-advisory-db/gems/redis-namespace/OSVDB-96425.yml +0 -16
  106. data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +0 -14
  107. data/data/ruby-advisory-db/gems/ruby_parser/OSVDB-90561.yml +0 -11
  108. data/data/ruby-advisory-db/gems/sounder/OSVDB-96278.yml +0 -13
  109. data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +0 -11
  110. data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +0 -11
  111. data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +0 -11
  112. data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +0 -11
  113. data/data/ruby-advisory-db/gems/sprout/OSVDB-100598.yml +0 -14
  114. data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +0 -10
  115. data/data/ruby-advisory-db/gems/webbynode/OSVDB-100920.yml +0 -11
  116. data/data/ruby-advisory-db/gems/wicked/OSVDB-98270.yml +0 -14
  117. data/data/ruby-advisory-db/gems/will_paginate/OSVDB-101138.yml +0 -15
  118. data/data/ruby-advisory-db/lib/scrape.rb +0 -87
  119. data/data/ruby-advisory-db/spec/advisory_example.rb +0 -165
  120. data/data/ruby-advisory-db/spec/gems_spec.rb +0 -7
  121. data/data/ruby-advisory-db/spec/spec_helper.rb +0 -1
@@ -1,21 +0,0 @@
1
- ---
2
- gem: loofah
3
- osvdb: 90945
4
- url: http://www.osvdb.org/show/osvdb/90945
5
- title: Loofah HTML and XSS injection vulnerability
6
- date: 2012-09-08
7
-
8
- description: |
9
- Loofah Gem for Ruby contains a flaw that allows a remote cross-site
10
- scripting (XSS) attack. This flaw exists because the
11
- Loofah::HTML::Document\#text function passes properly sanitized
12
- user-supplied input to the Loofah::XssFoliate and
13
- Loofah::Helpers\#strip_tags functions which convert input back to
14
- text. This may allow an attacker to create a specially crafted
15
- request that would execute arbitrary script code in a user's browser
16
- within the trust relationship between their browser and the server.
17
-
18
- cvss_v2: 5.0
19
-
20
- patched_versions:
21
- - ">= 0.4.6"
@@ -1,21 +0,0 @@
1
- ---
2
- gem: mail
3
- cve: 2011-0739
4
- osvdb: 70667
5
- url: http://www.osvdb.org/show/osvdb/70667
6
- title: >
7
- Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb Email From:
8
- Address Arbitrary Shell Command Injection
9
- date: 2011-01-25
10
-
11
- description: |
12
- Mail Gem for Ruby contains a flaw related to the failure to properly sanitise
13
- input passed from an email from address in the 'deliver()' function in
14
- 'lib/mail/network/delivery_methods/sendmail.rb' before being used as a
15
- command line argument. This may allow a remote attacker to inject arbitrary
16
- shell commands.
17
-
18
- cvss_v2: 6.8
19
-
20
- patched_versions:
21
- - ">= 2.2.15"
@@ -1,14 +0,0 @@
1
- ---
2
- gem: mail
3
- cve: 2012-2139
4
- osvdb: 81631
5
- url: http://www.osvdb.org/show/osvdb/81631
6
- title: Mail Gem for Ruby File Delivery Method to Parameter Traversal Arbitrary File Manipulation
7
- date: 2012-03-14
8
-
9
- description: |
10
- Mail Gem for Ruby contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the 'to' parameter within the delivery method. This directory traversal attack would allow the attacker to modify arbitrary files.
11
-
12
- cvss_v2: 5.0
13
- patched_versions:
14
- - ">= 2.4.4"
@@ -1,16 +0,0 @@
1
- ---
2
- gem: mail
3
- cve: 2012-2140
4
- osvdb: 81632
5
- url: http://www.osvdb.org/show/osvdb/81632
6
- title: Mail Gem for Ruby Multiple Delivery Method Remote Shell Command Execution
7
- date: 2012-03-14
8
-
9
- description: |
10
- Mail Gem for Ruby contains a flaw that occurs within the sendmail and exim
11
- delivery methods, which may allow an attacker to execute arbitrary shell
12
- commands..
13
-
14
- cvss_v2: 7.5
15
- patched_versions:
16
- - ">= 2.4.4"
@@ -1,10 +0,0 @@
1
- ---
2
- gem: md2pdf
3
- cve: 2013-1948
4
- osvdb: 92290
5
- url: http://osvdb.org/show/osvdb/92290
6
- title: md2pdf Gem for Ruby md2pdf/converter.rb File Name Shell Metacharacter Injection Arbitrary Command Execution
7
- date: 2013-04-13
8
- description: md2pdf Gem for Ruby contains a flaw that is due to the program failing to properly sanitize input passed to md2pdf/converter.rb. With a specially crafted file name that contains shell metacharacters, a context-dependent attacker can execute arbitrary commands
9
- cvss_v2: 10.0
10
- patched_versions:
@@ -1,15 +0,0 @@
1
- ---
2
- gem: mini_magick
3
- cve: 2013-2616
4
- osvdb: 91231
5
- url: http://osvdb.org/show/osvdb/91231
6
- title: MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection
7
- date: 2013-03-12
8
-
9
- description: MiniMagick Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input from an untrusted source passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.
10
-
11
- cvss_v2: 9.3
12
-
13
- patched_versions:
14
- - ">= 3.6.0"
15
-
@@ -1,16 +0,0 @@
1
- ---
2
- gem: multi_xml
3
- cve: 2013-0175
4
- osvdb: 89148
5
- url: http://osvdb.org/show/osvdb/89148
6
- title: multi_xml Gem for Ruby XML Parameter Parsing Remote Command Execution
7
- date: 2013-01-11
8
-
9
- description: |
10
- The multi_xml Gem for Ruby contains a flaw that is triggered when an error
11
- occurs during the parsing of the 'XML' parameter. With a crafted request
12
- containing arbitrary symbol and yaml types, a remote attacker can execute
13
- arbitrary commands.
14
-
15
- patched_versions:
16
- - ">= 0.5.2"
@@ -1,17 +0,0 @@
1
- ---
2
- gem: newrelic_rpm
3
- cve: 2013-0284
4
- osvdb: 90189
5
- url: http://osvdb.org/show/osvdb/90189
6
- title: Ruby on Rails newrelic_rpm Gem Discloses Sensitive Information
7
- date: 2012-12-06
8
-
9
- description: |
10
- A bug in the Ruby agent causes database connection information and raw SQL
11
- statements to be transmitted to New Relic servers. The database connection
12
- information includes the database IP address, username, and password
13
-
14
- cvss_v2: 5.0
15
-
16
- patched_versions:
17
- - ">= 3.5.3.25"
@@ -1,12 +0,0 @@
1
- ---
2
- gem: nokogiri
3
- cve: 2013-6460
4
- osvdb: 101179
5
- url: http://www.osvdb.org/show/osvdb/101179
6
- title: Nokogiri Gem for JRuby Crafted XML Document Handling Infinite Loop Remote DoS
7
- date: 2013-12-14
8
- description: Nokogiri Gem for JRuby contains a flaw that may allow a remote denial of service. The issue is triggered when handling a specially crafted XML document, which can result in an infinite loop. This may allow a context-dependent attacker to crash the server.
9
- cvss_v2:
10
- patched_versions:
11
- - ~> 1.5.11
12
- - ">= 1.6.1"
@@ -1,15 +0,0 @@
1
- ---
2
- gem: nokogiri
3
- cve: 2013-6461
4
- osvdb: 101458
5
- url: http://www.osvdb.org/show/osvdb/101458
6
- title: Nokogiri Gem for Ruby External Entity (XXE) Expansion Remote DoS
7
- date: 2013-12-14
8
- description: Nokogiri gem for Ruby contains an flaw that is triggered during the parsing of XML data.
9
- The issue is due to an incorrectly configured XML parser accepting XML external entities from
10
- an untrusted source. By sending specially crafted XML data, a remote attacker can cause an infinite
11
- loop and crash the program.
12
- cvss_v2:
13
- patched_versions:
14
- - ~> 1.5.11
15
- - ">= 1.6.1"
@@ -1,19 +0,0 @@
1
- ---
2
- gem: nori
3
- cve: 2013-0285
4
- osvdb: 90196
5
- url: http://osvdb.org/show/osvdb/90196
6
- title: Ruby Gem nori Parameter Parsing Remote Code Execution
7
- date: 2013-01-10
8
-
9
- description: |
10
- The Ruby Gem nori has a parameter parsing error that may allow an attacker
11
- to execute arbitrary code. This vulnerability has to do with type casting
12
- during parsing, and is related to CVE-2013-0156.
13
-
14
- cvss_v2: 7.5
15
-
16
- patched_versions:
17
- - ~> 1.0.3
18
- - ~> 1.1.4
19
- - ">= 2.0.2"
@@ -1,22 +0,0 @@
1
- ---
2
- gem: omniauth-facebook
3
- cve: 2013-4562
4
- osvdb: 99693
5
- url: http://www.osvdb.org/show/osvdb/99693
6
- title: omniauth-facebook Gem for Ruby Unspecified CSRF
7
- date: 2013-11-12
8
-
9
- description: |
10
- omniauth-facebook Gem for Ruby contains a flaw as HTTP requests do not
11
- require multiple steps, explicit confirmation, or a unique token when
12
- performing certain sensitive actions. By tricking a user into following
13
- a specially crafted link, a context-dependent attacker can perform a
14
- Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to
15
- perform an unspecified action.
16
-
17
- cvss_v2: 6.8
18
-
19
- patched_versions:
20
- - ">= 1.5.0"
21
- unaffected_versions:
22
- - "<= 1.4.0"
@@ -1,17 +0,0 @@
1
- ---
2
- gem: omniauth-facebook
3
- cve: 2013-4593
4
- osvdb: 99888
5
- url: http://www.osvdb.org/show/osvdb/99888
6
- title: omniauth-facebook Gem for Ruby Insecure Access Token Handling Authentication Bypass
7
- date: 2013-11-14
8
-
9
- description: |
10
- omniauth-facebook Gem for Ruby contains a flaw that is due to the application
11
- supporting passing the access token via the URL. This may allow a remote
12
- attacker to bypass authentication and authenticate as another user.
13
-
14
- cvss_v2: 6.8
15
-
16
- patched_versions:
17
- - ">= 1.5.1"
@@ -1,16 +0,0 @@
1
- ---
2
- gem: omniauth-oauth2
3
- cve: 2012-6134
4
- osvdb: 90264
5
- url: http://www.osvdb.org/show/osvdb/90264
6
- title: Ruby on Rails omniauth-oauth2 Gem CSRF vulnerability
7
- date: 2012-09-08
8
-
9
- description: |
10
- The omniauth-oauth2 Ruby Gem contains a flaw that allows an attacker to
11
- inject values into a user's session through a CSRF attack.
12
-
13
- cvss_v2: 6.8
14
-
15
- patched_versions:
16
- - ">= 1.1.1"
@@ -1,13 +0,0 @@
1
- ---
2
- gem: paperclip
3
- osvdb: 103151
4
- url: http://osvdb.org/show/osvdb/103151
5
- title: Paperclip Gem for Ruby contains a flaw
6
- date: 2014-01-31
7
- description: Paperclip Gem for Ruby contains a flaw that is due to the application failing to properly
8
- validate the file extension, instead only validating the Content-Type header during file uploads.
9
- This may allow a remote attacker to bypass restrictions on file types for uploaded files by
10
- spoofing the content-type.
11
- cvss_v2:
12
- patched_versions:
13
- - ">= 4.0.0"
@@ -1,12 +0,0 @@
1
- ---
2
- gem: paratrooper-newrelic
3
- cve: 2014-1234
4
- osvdb: 101839
5
- url: http://www.osvdb.org/show/osvdb/101839
6
- title: Paratrooper-newrelic Gem for Ruby contains a flaw
7
- date: 2014-01-08
8
- description: Paratrooper-newrelic Gem for Ruby contains a flaw in /lib/paratrooper-newrelic.rb.
9
- The issue is triggered when the script exposes the API key, allowing a local attacker to
10
- gain access to it by monitoring the process tree.
11
- cvss_v2: 2.1
12
- patched_versions:
@@ -1,13 +0,0 @@
1
- ---
2
- gem: paratrooper-pingdom
3
- cve: 2014-1233
4
- osvdb: 101847
5
- url: http://www.osvdb.org/show/osvdb/101847
6
- title: Paratrooper-pingdom Gem for Ruby contains a flaw
7
- date: 2013-12-26
8
- description: paratrooper-pingdom Gem for Ruby contains a flaw in /lib/paratrooper-pingdom.rb.
9
- The issue is triggered when the script exposes API login credentials, allowing a local
10
- attacker to gain access to the API key, username, and password for the API login by
11
- monitoring the process tree.
12
- cvss_v2: 2.1
13
- patched_versions:
@@ -1,11 +0,0 @@
1
- ---
2
- gem: pdfkit
3
- cve: 2013-1607
4
- osvdb: 90867
5
- url: http://osvdb.org/show/osvdb/90867
6
- title: PDFKit Gem for Ruby PDF File Generation Parameter Handling Remote Code Execution
7
- date: 2013-02-21
8
- description: PDFKit Gem for Ruby contains a flaw that is due to the program failing to properly validate input during the handling of parameters when generating PDF files. This may allow a remote attacker to potentially execute arbitrary code via the pdfkit generation options.
9
- cvss_v2:
10
- patched_versions:
11
- - ">= 0.5.3"
@@ -1,18 +0,0 @@
1
- ---
2
- gem: rack-cache
3
- cve: 2012-2671
4
- osvdb: 83077
5
- url: http://osvdb.org/83077
6
- title: rack-cache Rubygem Sensitive HTTP Header Caching Weakness
7
- date: 2012-06-06
8
-
9
- description: |
10
- Rack::Cache (rack-cache) contains a flaw related to the rubygem caching
11
- sensitive HTTP headers. This will result in a weakness that may make it
12
- easier for an attacker to gain access to a user's session via a specially
13
- crafted header.
14
-
15
- cvss_v2: 7.5
16
-
17
- patched_versions:
18
- - ">= 1.2"
@@ -1,23 +0,0 @@
1
- ---
2
- gem: rack
3
- cve: 2013-0263
4
- osvdb: 89939
5
- url: http://osvdb.org/show/osvdb/89939
6
- title: |
7
- Rack Rack::Session::Cookie Function Timing Attack Remote Code Execution
8
- date: 2009-12-01
9
-
10
- description: |
11
- Rack contains a flaw that is due to an error in the Rack::Session::Cookie
12
- function. Users of the Marshal session cookie encoding (the default), are
13
- subject to a timing attack that may lead an attacker to execute arbitrary
14
- code. This attack is more practical against 'cloud' users as intra-cloud
15
- latencies are sufficiently low to make the attack viable.
16
-
17
- cvss_v2: 5.1
18
- patched_versions:
19
- - ~> 1.1.6
20
- - ~> 1.2.8
21
- - ~> 1.3.10
22
- - ~> 1.4.5
23
- - ">= 1.5.2"
@@ -1,20 +0,0 @@
1
- ---
2
- gem: rbovirt
3
- cve: 2014-0036
4
- osvdb: 104080
5
- url: http://osvdb.org/show/osvdb/104080
6
- title: rbovirt Gem for Ruby contains a flaw
7
- date: 2014-03-05
8
-
9
- description: |
10
- rbovirt Gem for Ruby contains a flaw related to certificate validation.
11
- The issue is due to the program failing to validate SSL certificates. This may
12
- allow an attacker with access to network traffic (e.g. MiTM, DNS cache
13
- poisoning) to spoof the SSL server via an arbitrary certificate that appears
14
- valid. Such an attack would allow for the interception of sensitive traffic,
15
- and potentially allow for the injection of content into the SSL stream.
16
-
17
- cvss_v2:
18
-
19
- patched_versions:
20
- - '>= 0.0.24'
@@ -1,27 +0,0 @@
1
- ---
2
- gem: rdoc
3
- cve: 2013-0256
4
- osvdb: 90004
5
- url: http://www.osvdb.org/show/osvdb/90004
6
- title: RDoc 2.3.0 through 3.12 XSS Exploit
7
- date: 2013-02-06
8
-
9
- description: |
10
- Doc documentation generated by rdoc 2.3.0 through rdoc 3.12 and prereleases
11
- up to rdoc 4.0.0.preview2.1 are vulnerable to an XSS exploit. This exploit
12
- may lead to cookie disclosure to third parties.
13
-
14
- The exploit exists in darkfish.js which is copied from the RDoc install
15
- location to the generated documentation.
16
-
17
- RDoc is a static documentation generation tool. Patching the library itself
18
- is insufficient to correct this exploit.
19
-
20
- This exploit was discovered by Evgeny Ermakov <corwmh@gmail.com>.
21
-
22
- cvss_v2: 4.3
23
-
24
- patched_versions:
25
- - ~> 3.9.5
26
- - ~> 3.12.1
27
- - ">= 4.0"
@@ -1,16 +0,0 @@
1
- ---
2
- gem: redis-namespace
3
- osvdb: 96425
4
- url: http://www.osvdb.org/show/osvdb/96425
5
- title: redis-namespace Gem for Ruby contains a flaw in the method_missing implementation
6
- date: 2013-08-03
7
- description: |
8
- redis-namespace Gem for Ruby contains a flaw in the method_missing implementation.
9
- The issue is triggered when handling exec commands called via send(). This may allow a
10
- remote attacker to execute arbitrary commands.
11
- cvss_v2:
12
- patched_versions:
13
- - ">= 1.3.1"
14
- - ">= 1.2.2"
15
- - ">= 1.1.1"
16
- - ">= 1.0.4"
@@ -1,14 +0,0 @@
1
- ---
2
- gem: rgpg
3
- osvdb: 95948
4
- cve: 2013-4203
5
- url: http://www.osvdb.org/show/osvdb/95948
6
- title: Ruby rgpg Gem Shell Command Injection Vulnerabilities
7
- date: 2013-08-02
8
- description: |
9
- rgpg Gem for Ruby contains a flaw in the GpgHelper module (lib/rgpg/gpg_helper.rb).
10
- The issue is due to the program failing to properly sanitize user-supplied input before being used in the system() function for execution.
11
- This may allow a remote attacker to execute arbitrary commands.
12
- cvss_v2: 7.5
13
- patched_versions:
14
- - ">= 0.2.3"