mrjoy-bundler-audit 0.3.3 → 0.3.4
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.gitignore +1 -2
- data/.travis.yml +2 -0
- data/ChangeLog.md +10 -0
- data/Gemfile +1 -1
- data/Rakefile +12 -10
- data/lib/bundler/audit/cli.rb +3 -0
- data/lib/bundler/audit/database.rb +57 -24
- data/lib/bundler/audit/version.rb +1 -1
- data/mrjoy-bundler-audit.gemspec +0 -7
- data/spec/advisory_spec.rb +8 -3
- data/spec/bundle/insecure_sources/Gemfile.lock +98 -0
- data/spec/bundle/secure/Gemfile.lock +90 -0
- data/spec/bundle/unpatched_gems/Gemfile.lock +92 -0
- data/spec/bundle/wrapper.rb +36 -0
- data/spec/database_spec.rb +62 -42
- data/{data/ruby-advisory-db/gems/actionpack → spec/fixtures}/OSVDB-84243.yml +0 -0
- data/spec/integration_spec.rb +52 -14
- data/spec/spec_helper.rb +5 -45
- metadata +7 -104
- data/.gitmodules +0 -3
- data/data/ruby-advisory-db.ts +0 -1
- data/data/ruby-advisory-db/.gitignore +0 -1
- data/data/ruby-advisory-db/.rspec +0 -1
- data/data/ruby-advisory-db/CONTRIBUTING.md +0 -6
- data/data/ruby-advisory-db/CONTRIBUTORS.md +0 -24
- data/data/ruby-advisory-db/Gemfile +0 -3
- data/data/ruby-advisory-db/LICENSE.txt +0 -5
- data/data/ruby-advisory-db/README.md +0 -82
- data/data/ruby-advisory-db/Rakefile +0 -27
- data/data/ruby-advisory-db/gems/actionmailer/OSVDB-98629.yml +0 -17
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +0 -20
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +0 -21
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +0 -27
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +0 -22
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-103439.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-103440.yml +0 -22
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-79727.yml +0 -26
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-84513.yml +0 -23
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-84515.yml +0 -26
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-89026.yml +0 -24
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-91452.yml +0 -20
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-91454.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-103438.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-82403.yml +0 -25
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-82610.yml +0 -24
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-89025.yml +0 -24
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-90072.yml +0 -21
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-90073.yml +0 -23
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-91453.yml +0 -26
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-79726.yml +0 -26
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-84516.yml +0 -23
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-89594.yml +0 -25
- data/data/ruby-advisory-db/gems/activesupport/OSVDB-91451.yml +0 -28
- data/data/ruby-advisory-db/gems/arabic-prawn/OSVDB-104365.yml +0 -15
- data/data/ruby-advisory-db/gems/cocaine/OSVDB-98835.yml +0 -15
- data/data/ruby-advisory-db/gems/command_wrap/OSVDB-91450.yml +0 -10
- data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +0 -17
- data/data/ruby-advisory-db/gems/cremefraiche/OSVDB-93395.yml +0 -11
- data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +0 -12
- data/data/ruby-advisory-db/gems/devise/OSVDB-89642.yml +0 -20
- data/data/ruby-advisory-db/gems/dragonfly/OSVDB-90647.yml +0 -19
- data/data/ruby-advisory-db/gems/echor/OSVDB-102129.yml +0 -11
- data/data/ruby-advisory-db/gems/echor/OSVDB-102130.yml +0 -10
- data/data/ruby-advisory-db/gems/enum_column3/OSVDB-94679.yml +0 -9
- data/data/ruby-advisory-db/gems/extlib/OSVDB-90740.yml +0 -18
- data/data/ruby-advisory-db/gems/fastreader/OSVDB-91232.yml +0 -12
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90715.yml +0 -10
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90716.yml +0 -10
- data/data/ruby-advisory-db/gems/fileutils/OSVDB-90717.yml +0 -10
- data/data/ruby-advisory-db/gems/flash_tool/OSVDB-90829.yml +0 -9
- data/data/ruby-advisory-db/gems/fog-dragonfly/OSVDB-96798.yml +0 -13
- data/data/ruby-advisory-db/gems/ftpd/OSVDB-90784.yml +0 -18
- data/data/ruby-advisory-db/gems/gitlab-grit/OSVDB-99370.yml +0 -14
- data/data/ruby-advisory-db/gems/gtk2/OSVDB-40774.yml +0 -20
- data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +0 -14
- data/data/ruby-advisory-db/gems/i18n/OSVDB-100528.yml +0 -17
- data/data/ruby-advisory-db/gems/json/OSVDB-90074.yml +0 -23
- data/data/ruby-advisory-db/gems/karteek-docsplit/OSVDB-92117.yml +0 -10
- data/data/ruby-advisory-db/gems/kelredd-pruview/OSVDB-92228.yml +0 -10
- data/data/ruby-advisory-db/gems/ldoce/OSVDB-91870.yml +0 -10
- data/data/ruby-advisory-db/gems/loofah/OSVDB-90945.yml +0 -21
- data/data/ruby-advisory-db/gems/mail/OSVDB-70667.yml +0 -21
- data/data/ruby-advisory-db/gems/mail/OSVDB-81631.yml +0 -14
- data/data/ruby-advisory-db/gems/mail/OSVDB-81632.yml +0 -16
- data/data/ruby-advisory-db/gems/md2pdf/OSVDB-92290.yml +0 -10
- data/data/ruby-advisory-db/gems/mini_magick/OSVDB-91231.yml +0 -15
- data/data/ruby-advisory-db/gems/multi_xml/OSVDB-89148.yml +0 -16
- data/data/ruby-advisory-db/gems/newrelic_rpm/OSVDB-90189.yml +0 -17
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101179.yml +0 -12
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101458.yml +0 -15
- data/data/ruby-advisory-db/gems/nori/OSVDB-90196.yml +0 -19
- data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99693.yml +0 -22
- data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99888.yml +0 -17
- data/data/ruby-advisory-db/gems/omniauth-oauth2/OSVDB-90264.yml +0 -16
- data/data/ruby-advisory-db/gems/paperclip/OSVDB-103151.yml +0 -13
- data/data/ruby-advisory-db/gems/paratrooper-newrelic/OSVDB-101839.yml +0 -12
- data/data/ruby-advisory-db/gems/paratrooper-pingdom/OSVDB-101847.yml +0 -13
- data/data/ruby-advisory-db/gems/pdfkit/OSVDB-90867.yml +0 -11
- data/data/ruby-advisory-db/gems/rack-cache/OSVDB-83077.yml +0 -18
- data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +0 -23
- data/data/ruby-advisory-db/gems/rbovirt/OSVDB-104080.yml +0 -20
- data/data/ruby-advisory-db/gems/rdoc/OSVDB-90004.yml +0 -27
- data/data/ruby-advisory-db/gems/redis-namespace/OSVDB-96425.yml +0 -16
- data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +0 -14
- data/data/ruby-advisory-db/gems/ruby_parser/OSVDB-90561.yml +0 -11
- data/data/ruby-advisory-db/gems/sounder/OSVDB-96278.yml +0 -13
- data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +0 -11
- data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +0 -11
- data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +0 -11
- data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +0 -11
- data/data/ruby-advisory-db/gems/sprout/OSVDB-100598.yml +0 -14
- data/data/ruby-advisory-db/gems/thumbshooter/OSVDB-91839.yml +0 -10
- data/data/ruby-advisory-db/gems/webbynode/OSVDB-100920.yml +0 -11
- data/data/ruby-advisory-db/gems/wicked/OSVDB-98270.yml +0 -14
- data/data/ruby-advisory-db/gems/will_paginate/OSVDB-101138.yml +0 -15
- data/data/ruby-advisory-db/lib/scrape.rb +0 -87
- data/data/ruby-advisory-db/spec/advisory_example.rb +0 -165
- data/data/ruby-advisory-db/spec/gems_spec.rb +0 -7
- data/data/ruby-advisory-db/spec/spec_helper.rb +0 -1
@@ -1,21 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: loofah
|
3
|
-
osvdb: 90945
|
4
|
-
url: http://www.osvdb.org/show/osvdb/90945
|
5
|
-
title: Loofah HTML and XSS injection vulnerability
|
6
|
-
date: 2012-09-08
|
7
|
-
|
8
|
-
description: |
|
9
|
-
Loofah Gem for Ruby contains a flaw that allows a remote cross-site
|
10
|
-
scripting (XSS) attack. This flaw exists because the
|
11
|
-
Loofah::HTML::Document\#text function passes properly sanitized
|
12
|
-
user-supplied input to the Loofah::XssFoliate and
|
13
|
-
Loofah::Helpers\#strip_tags functions which convert input back to
|
14
|
-
text. This may allow an attacker to create a specially crafted
|
15
|
-
request that would execute arbitrary script code in a user's browser
|
16
|
-
within the trust relationship between their browser and the server.
|
17
|
-
|
18
|
-
cvss_v2: 5.0
|
19
|
-
|
20
|
-
patched_versions:
|
21
|
-
- ">= 0.4.6"
|
@@ -1,21 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: mail
|
3
|
-
cve: 2011-0739
|
4
|
-
osvdb: 70667
|
5
|
-
url: http://www.osvdb.org/show/osvdb/70667
|
6
|
-
title: >
|
7
|
-
Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb Email From:
|
8
|
-
Address Arbitrary Shell Command Injection
|
9
|
-
date: 2011-01-25
|
10
|
-
|
11
|
-
description: |
|
12
|
-
Mail Gem for Ruby contains a flaw related to the failure to properly sanitise
|
13
|
-
input passed from an email from address in the 'deliver()' function in
|
14
|
-
'lib/mail/network/delivery_methods/sendmail.rb' before being used as a
|
15
|
-
command line argument. This may allow a remote attacker to inject arbitrary
|
16
|
-
shell commands.
|
17
|
-
|
18
|
-
cvss_v2: 6.8
|
19
|
-
|
20
|
-
patched_versions:
|
21
|
-
- ">= 2.2.15"
|
@@ -1,14 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: mail
|
3
|
-
cve: 2012-2139
|
4
|
-
osvdb: 81631
|
5
|
-
url: http://www.osvdb.org/show/osvdb/81631
|
6
|
-
title: Mail Gem for Ruby File Delivery Method to Parameter Traversal Arbitrary File Manipulation
|
7
|
-
date: 2012-03-14
|
8
|
-
|
9
|
-
description: |
|
10
|
-
Mail Gem for Ruby contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the 'to' parameter within the delivery method. This directory traversal attack would allow the attacker to modify arbitrary files.
|
11
|
-
|
12
|
-
cvss_v2: 5.0
|
13
|
-
patched_versions:
|
14
|
-
- ">= 2.4.4"
|
@@ -1,16 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: mail
|
3
|
-
cve: 2012-2140
|
4
|
-
osvdb: 81632
|
5
|
-
url: http://www.osvdb.org/show/osvdb/81632
|
6
|
-
title: Mail Gem for Ruby Multiple Delivery Method Remote Shell Command Execution
|
7
|
-
date: 2012-03-14
|
8
|
-
|
9
|
-
description: |
|
10
|
-
Mail Gem for Ruby contains a flaw that occurs within the sendmail and exim
|
11
|
-
delivery methods, which may allow an attacker to execute arbitrary shell
|
12
|
-
commands..
|
13
|
-
|
14
|
-
cvss_v2: 7.5
|
15
|
-
patched_versions:
|
16
|
-
- ">= 2.4.4"
|
@@ -1,10 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: md2pdf
|
3
|
-
cve: 2013-1948
|
4
|
-
osvdb: 92290
|
5
|
-
url: http://osvdb.org/show/osvdb/92290
|
6
|
-
title: md2pdf Gem for Ruby md2pdf/converter.rb File Name Shell Metacharacter Injection Arbitrary Command Execution
|
7
|
-
date: 2013-04-13
|
8
|
-
description: md2pdf Gem for Ruby contains a flaw that is due to the program failing to properly sanitize input passed to md2pdf/converter.rb. With a specially crafted file name that contains shell metacharacters, a context-dependent attacker can execute arbitrary commands
|
9
|
-
cvss_v2: 10.0
|
10
|
-
patched_versions:
|
@@ -1,15 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: mini_magick
|
3
|
-
cve: 2013-2616
|
4
|
-
osvdb: 91231
|
5
|
-
url: http://osvdb.org/show/osvdb/91231
|
6
|
-
title: MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection
|
7
|
-
date: 2013-03-12
|
8
|
-
|
9
|
-
description: MiniMagick Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input from an untrusted source passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.
|
10
|
-
|
11
|
-
cvss_v2: 9.3
|
12
|
-
|
13
|
-
patched_versions:
|
14
|
-
- ">= 3.6.0"
|
15
|
-
|
@@ -1,16 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: multi_xml
|
3
|
-
cve: 2013-0175
|
4
|
-
osvdb: 89148
|
5
|
-
url: http://osvdb.org/show/osvdb/89148
|
6
|
-
title: multi_xml Gem for Ruby XML Parameter Parsing Remote Command Execution
|
7
|
-
date: 2013-01-11
|
8
|
-
|
9
|
-
description: |
|
10
|
-
The multi_xml Gem for Ruby contains a flaw that is triggered when an error
|
11
|
-
occurs during the parsing of the 'XML' parameter. With a crafted request
|
12
|
-
containing arbitrary symbol and yaml types, a remote attacker can execute
|
13
|
-
arbitrary commands.
|
14
|
-
|
15
|
-
patched_versions:
|
16
|
-
- ">= 0.5.2"
|
@@ -1,17 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: newrelic_rpm
|
3
|
-
cve: 2013-0284
|
4
|
-
osvdb: 90189
|
5
|
-
url: http://osvdb.org/show/osvdb/90189
|
6
|
-
title: Ruby on Rails newrelic_rpm Gem Discloses Sensitive Information
|
7
|
-
date: 2012-12-06
|
8
|
-
|
9
|
-
description: |
|
10
|
-
A bug in the Ruby agent causes database connection information and raw SQL
|
11
|
-
statements to be transmitted to New Relic servers. The database connection
|
12
|
-
information includes the database IP address, username, and password
|
13
|
-
|
14
|
-
cvss_v2: 5.0
|
15
|
-
|
16
|
-
patched_versions:
|
17
|
-
- ">= 3.5.3.25"
|
@@ -1,12 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: nokogiri
|
3
|
-
cve: 2013-6460
|
4
|
-
osvdb: 101179
|
5
|
-
url: http://www.osvdb.org/show/osvdb/101179
|
6
|
-
title: Nokogiri Gem for JRuby Crafted XML Document Handling Infinite Loop Remote DoS
|
7
|
-
date: 2013-12-14
|
8
|
-
description: Nokogiri Gem for JRuby contains a flaw that may allow a remote denial of service. The issue is triggered when handling a specially crafted XML document, which can result in an infinite loop. This may allow a context-dependent attacker to crash the server.
|
9
|
-
cvss_v2:
|
10
|
-
patched_versions:
|
11
|
-
- ~> 1.5.11
|
12
|
-
- ">= 1.6.1"
|
@@ -1,15 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: nokogiri
|
3
|
-
cve: 2013-6461
|
4
|
-
osvdb: 101458
|
5
|
-
url: http://www.osvdb.org/show/osvdb/101458
|
6
|
-
title: Nokogiri Gem for Ruby External Entity (XXE) Expansion Remote DoS
|
7
|
-
date: 2013-12-14
|
8
|
-
description: Nokogiri gem for Ruby contains an flaw that is triggered during the parsing of XML data.
|
9
|
-
The issue is due to an incorrectly configured XML parser accepting XML external entities from
|
10
|
-
an untrusted source. By sending specially crafted XML data, a remote attacker can cause an infinite
|
11
|
-
loop and crash the program.
|
12
|
-
cvss_v2:
|
13
|
-
patched_versions:
|
14
|
-
- ~> 1.5.11
|
15
|
-
- ">= 1.6.1"
|
@@ -1,19 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: nori
|
3
|
-
cve: 2013-0285
|
4
|
-
osvdb: 90196
|
5
|
-
url: http://osvdb.org/show/osvdb/90196
|
6
|
-
title: Ruby Gem nori Parameter Parsing Remote Code Execution
|
7
|
-
date: 2013-01-10
|
8
|
-
|
9
|
-
description: |
|
10
|
-
The Ruby Gem nori has a parameter parsing error that may allow an attacker
|
11
|
-
to execute arbitrary code. This vulnerability has to do with type casting
|
12
|
-
during parsing, and is related to CVE-2013-0156.
|
13
|
-
|
14
|
-
cvss_v2: 7.5
|
15
|
-
|
16
|
-
patched_versions:
|
17
|
-
- ~> 1.0.3
|
18
|
-
- ~> 1.1.4
|
19
|
-
- ">= 2.0.2"
|
@@ -1,22 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: omniauth-facebook
|
3
|
-
cve: 2013-4562
|
4
|
-
osvdb: 99693
|
5
|
-
url: http://www.osvdb.org/show/osvdb/99693
|
6
|
-
title: omniauth-facebook Gem for Ruby Unspecified CSRF
|
7
|
-
date: 2013-11-12
|
8
|
-
|
9
|
-
description: |
|
10
|
-
omniauth-facebook Gem for Ruby contains a flaw as HTTP requests do not
|
11
|
-
require multiple steps, explicit confirmation, or a unique token when
|
12
|
-
performing certain sensitive actions. By tricking a user into following
|
13
|
-
a specially crafted link, a context-dependent attacker can perform a
|
14
|
-
Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to
|
15
|
-
perform an unspecified action.
|
16
|
-
|
17
|
-
cvss_v2: 6.8
|
18
|
-
|
19
|
-
patched_versions:
|
20
|
-
- ">= 1.5.0"
|
21
|
-
unaffected_versions:
|
22
|
-
- "<= 1.4.0"
|
@@ -1,17 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: omniauth-facebook
|
3
|
-
cve: 2013-4593
|
4
|
-
osvdb: 99888
|
5
|
-
url: http://www.osvdb.org/show/osvdb/99888
|
6
|
-
title: omniauth-facebook Gem for Ruby Insecure Access Token Handling Authentication Bypass
|
7
|
-
date: 2013-11-14
|
8
|
-
|
9
|
-
description: |
|
10
|
-
omniauth-facebook Gem for Ruby contains a flaw that is due to the application
|
11
|
-
supporting passing the access token via the URL. This may allow a remote
|
12
|
-
attacker to bypass authentication and authenticate as another user.
|
13
|
-
|
14
|
-
cvss_v2: 6.8
|
15
|
-
|
16
|
-
patched_versions:
|
17
|
-
- ">= 1.5.1"
|
@@ -1,16 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: omniauth-oauth2
|
3
|
-
cve: 2012-6134
|
4
|
-
osvdb: 90264
|
5
|
-
url: http://www.osvdb.org/show/osvdb/90264
|
6
|
-
title: Ruby on Rails omniauth-oauth2 Gem CSRF vulnerability
|
7
|
-
date: 2012-09-08
|
8
|
-
|
9
|
-
description: |
|
10
|
-
The omniauth-oauth2 Ruby Gem contains a flaw that allows an attacker to
|
11
|
-
inject values into a user's session through a CSRF attack.
|
12
|
-
|
13
|
-
cvss_v2: 6.8
|
14
|
-
|
15
|
-
patched_versions:
|
16
|
-
- ">= 1.1.1"
|
@@ -1,13 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: paperclip
|
3
|
-
osvdb: 103151
|
4
|
-
url: http://osvdb.org/show/osvdb/103151
|
5
|
-
title: Paperclip Gem for Ruby contains a flaw
|
6
|
-
date: 2014-01-31
|
7
|
-
description: Paperclip Gem for Ruby contains a flaw that is due to the application failing to properly
|
8
|
-
validate the file extension, instead only validating the Content-Type header during file uploads.
|
9
|
-
This may allow a remote attacker to bypass restrictions on file types for uploaded files by
|
10
|
-
spoofing the content-type.
|
11
|
-
cvss_v2:
|
12
|
-
patched_versions:
|
13
|
-
- ">= 4.0.0"
|
@@ -1,12 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: paratrooper-newrelic
|
3
|
-
cve: 2014-1234
|
4
|
-
osvdb: 101839
|
5
|
-
url: http://www.osvdb.org/show/osvdb/101839
|
6
|
-
title: Paratrooper-newrelic Gem for Ruby contains a flaw
|
7
|
-
date: 2014-01-08
|
8
|
-
description: Paratrooper-newrelic Gem for Ruby contains a flaw in /lib/paratrooper-newrelic.rb.
|
9
|
-
The issue is triggered when the script exposes the API key, allowing a local attacker to
|
10
|
-
gain access to it by monitoring the process tree.
|
11
|
-
cvss_v2: 2.1
|
12
|
-
patched_versions:
|
@@ -1,13 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: paratrooper-pingdom
|
3
|
-
cve: 2014-1233
|
4
|
-
osvdb: 101847
|
5
|
-
url: http://www.osvdb.org/show/osvdb/101847
|
6
|
-
title: Paratrooper-pingdom Gem for Ruby contains a flaw
|
7
|
-
date: 2013-12-26
|
8
|
-
description: paratrooper-pingdom Gem for Ruby contains a flaw in /lib/paratrooper-pingdom.rb.
|
9
|
-
The issue is triggered when the script exposes API login credentials, allowing a local
|
10
|
-
attacker to gain access to the API key, username, and password for the API login by
|
11
|
-
monitoring the process tree.
|
12
|
-
cvss_v2: 2.1
|
13
|
-
patched_versions:
|
@@ -1,11 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: pdfkit
|
3
|
-
cve: 2013-1607
|
4
|
-
osvdb: 90867
|
5
|
-
url: http://osvdb.org/show/osvdb/90867
|
6
|
-
title: PDFKit Gem for Ruby PDF File Generation Parameter Handling Remote Code Execution
|
7
|
-
date: 2013-02-21
|
8
|
-
description: PDFKit Gem for Ruby contains a flaw that is due to the program failing to properly validate input during the handling of parameters when generating PDF files. This may allow a remote attacker to potentially execute arbitrary code via the pdfkit generation options.
|
9
|
-
cvss_v2:
|
10
|
-
patched_versions:
|
11
|
-
- ">= 0.5.3"
|
@@ -1,18 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: rack-cache
|
3
|
-
cve: 2012-2671
|
4
|
-
osvdb: 83077
|
5
|
-
url: http://osvdb.org/83077
|
6
|
-
title: rack-cache Rubygem Sensitive HTTP Header Caching Weakness
|
7
|
-
date: 2012-06-06
|
8
|
-
|
9
|
-
description: |
|
10
|
-
Rack::Cache (rack-cache) contains a flaw related to the rubygem caching
|
11
|
-
sensitive HTTP headers. This will result in a weakness that may make it
|
12
|
-
easier for an attacker to gain access to a user's session via a specially
|
13
|
-
crafted header.
|
14
|
-
|
15
|
-
cvss_v2: 7.5
|
16
|
-
|
17
|
-
patched_versions:
|
18
|
-
- ">= 1.2"
|
@@ -1,23 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: rack
|
3
|
-
cve: 2013-0263
|
4
|
-
osvdb: 89939
|
5
|
-
url: http://osvdb.org/show/osvdb/89939
|
6
|
-
title: |
|
7
|
-
Rack Rack::Session::Cookie Function Timing Attack Remote Code Execution
|
8
|
-
date: 2009-12-01
|
9
|
-
|
10
|
-
description: |
|
11
|
-
Rack contains a flaw that is due to an error in the Rack::Session::Cookie
|
12
|
-
function. Users of the Marshal session cookie encoding (the default), are
|
13
|
-
subject to a timing attack that may lead an attacker to execute arbitrary
|
14
|
-
code. This attack is more practical against 'cloud' users as intra-cloud
|
15
|
-
latencies are sufficiently low to make the attack viable.
|
16
|
-
|
17
|
-
cvss_v2: 5.1
|
18
|
-
patched_versions:
|
19
|
-
- ~> 1.1.6
|
20
|
-
- ~> 1.2.8
|
21
|
-
- ~> 1.3.10
|
22
|
-
- ~> 1.4.5
|
23
|
-
- ">= 1.5.2"
|
@@ -1,20 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: rbovirt
|
3
|
-
cve: 2014-0036
|
4
|
-
osvdb: 104080
|
5
|
-
url: http://osvdb.org/show/osvdb/104080
|
6
|
-
title: rbovirt Gem for Ruby contains a flaw
|
7
|
-
date: 2014-03-05
|
8
|
-
|
9
|
-
description: |
|
10
|
-
rbovirt Gem for Ruby contains a flaw related to certificate validation.
|
11
|
-
The issue is due to the program failing to validate SSL certificates. This may
|
12
|
-
allow an attacker with access to network traffic (e.g. MiTM, DNS cache
|
13
|
-
poisoning) to spoof the SSL server via an arbitrary certificate that appears
|
14
|
-
valid. Such an attack would allow for the interception of sensitive traffic,
|
15
|
-
and potentially allow for the injection of content into the SSL stream.
|
16
|
-
|
17
|
-
cvss_v2:
|
18
|
-
|
19
|
-
patched_versions:
|
20
|
-
- '>= 0.0.24'
|
@@ -1,27 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: rdoc
|
3
|
-
cve: 2013-0256
|
4
|
-
osvdb: 90004
|
5
|
-
url: http://www.osvdb.org/show/osvdb/90004
|
6
|
-
title: RDoc 2.3.0 through 3.12 XSS Exploit
|
7
|
-
date: 2013-02-06
|
8
|
-
|
9
|
-
description: |
|
10
|
-
Doc documentation generated by rdoc 2.3.0 through rdoc 3.12 and prereleases
|
11
|
-
up to rdoc 4.0.0.preview2.1 are vulnerable to an XSS exploit. This exploit
|
12
|
-
may lead to cookie disclosure to third parties.
|
13
|
-
|
14
|
-
The exploit exists in darkfish.js which is copied from the RDoc install
|
15
|
-
location to the generated documentation.
|
16
|
-
|
17
|
-
RDoc is a static documentation generation tool. Patching the library itself
|
18
|
-
is insufficient to correct this exploit.
|
19
|
-
|
20
|
-
This exploit was discovered by Evgeny Ermakov <corwmh@gmail.com>.
|
21
|
-
|
22
|
-
cvss_v2: 4.3
|
23
|
-
|
24
|
-
patched_versions:
|
25
|
-
- ~> 3.9.5
|
26
|
-
- ~> 3.12.1
|
27
|
-
- ">= 4.0"
|
@@ -1,16 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: redis-namespace
|
3
|
-
osvdb: 96425
|
4
|
-
url: http://www.osvdb.org/show/osvdb/96425
|
5
|
-
title: redis-namespace Gem for Ruby contains a flaw in the method_missing implementation
|
6
|
-
date: 2013-08-03
|
7
|
-
description: |
|
8
|
-
redis-namespace Gem for Ruby contains a flaw in the method_missing implementation.
|
9
|
-
The issue is triggered when handling exec commands called via send(). This may allow a
|
10
|
-
remote attacker to execute arbitrary commands.
|
11
|
-
cvss_v2:
|
12
|
-
patched_versions:
|
13
|
-
- ">= 1.3.1"
|
14
|
-
- ">= 1.2.2"
|
15
|
-
- ">= 1.1.1"
|
16
|
-
- ">= 1.0.4"
|
@@ -1,14 +0,0 @@
|
|
1
|
-
---
|
2
|
-
gem: rgpg
|
3
|
-
osvdb: 95948
|
4
|
-
cve: 2013-4203
|
5
|
-
url: http://www.osvdb.org/show/osvdb/95948
|
6
|
-
title: Ruby rgpg Gem Shell Command Injection Vulnerabilities
|
7
|
-
date: 2013-08-02
|
8
|
-
description: |
|
9
|
-
rgpg Gem for Ruby contains a flaw in the GpgHelper module (lib/rgpg/gpg_helper.rb).
|
10
|
-
The issue is due to the program failing to properly sanitize user-supplied input before being used in the system() function for execution.
|
11
|
-
This may allow a remote attacker to execute arbitrary commands.
|
12
|
-
cvss_v2: 7.5
|
13
|
-
patched_versions:
|
14
|
-
- ">= 0.2.3"
|