mrjoy-bundler-audit 0.3.2 → 0.3.3

Sign up to get free protection for your applications and to get access to all the features.
Files changed (60) hide show
  1. checksums.yaml +4 -4
  2. data/.ruby-gemset +1 -0
  3. data/.ruby-version +1 -0
  4. data/.travis.yml +2 -0
  5. data/ChangeLog.md +18 -0
  6. data/Gemfile +1 -1
  7. data/README.md +5 -2
  8. data/Rakefile +15 -22
  9. data/data/ruby-advisory-db/CONTRIBUTORS.md +10 -0
  10. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +20 -0
  11. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +21 -0
  12. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +27 -0
  13. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +24 -0
  14. data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +22 -0
  15. data/data/ruby-advisory-db/gems/actionpack/OSVDB-103439.yml +24 -0
  16. data/data/ruby-advisory-db/gems/actionpack/OSVDB-103440.yml +22 -0
  17. data/data/ruby-advisory-db/gems/activerecord/OSVDB-103438.yml +23 -0
  18. data/data/ruby-advisory-db/gems/arabic-prawn/OSVDB-104365.yml +15 -0
  19. data/data/ruby-advisory-db/gems/cocaine/OSVDB-98835.yml +2 -2
  20. data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +1 -1
  21. data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +1 -1
  22. data/data/ruby-advisory-db/gems/echor/OSVDB-102129.yml +11 -0
  23. data/data/ruby-advisory-db/gems/echor/OSVDB-102130.yml +10 -0
  24. data/data/ruby-advisory-db/gems/gitlab-grit/OSVDB-99370.yml +14 -0
  25. data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +3 -8
  26. data/data/ruby-advisory-db/gems/i18n/OSVDB-100528.yml +17 -0
  27. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101179.yml +12 -0
  28. data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101458.yml +15 -0
  29. data/data/ruby-advisory-db/gems/nori/OSVDB-90196.yml +1 -1
  30. data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99693.yml +22 -0
  31. data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99888.yml +17 -0
  32. data/data/ruby-advisory-db/gems/paperclip/OSVDB-103151.yml +13 -0
  33. data/data/ruby-advisory-db/gems/paratrooper-newrelic/OSVDB-101839.yml +12 -0
  34. data/data/ruby-advisory-db/gems/paratrooper-pingdom/OSVDB-101847.yml +13 -0
  35. data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +1 -1
  36. data/data/ruby-advisory-db/gems/rbovirt/OSVDB-104080.yml +20 -0
  37. data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +2 -1
  38. data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +3 -2
  39. data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +3 -2
  40. data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +3 -2
  41. data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +3 -2
  42. data/data/ruby-advisory-db/gems/sprout/OSVDB-100598.yml +14 -0
  43. data/data/ruby-advisory-db/gems/webbynode/OSVDB-100920.yml +11 -0
  44. data/data/ruby-advisory-db/gems/will_paginate/OSVDB-101138.yml +15 -0
  45. data/data/ruby-advisory-db/spec/advisory_example.rb +3 -3
  46. data/data/ruby-advisory-db/spec/gems_spec.rb +3 -4
  47. data/data/ruby-advisory-db.ts +1 -0
  48. data/gemspec.yml +2 -1
  49. data/lib/bundler/audit/cli.rb +7 -8
  50. data/lib/bundler/audit/database.rb +7 -5
  51. data/lib/bundler/audit/task.rb +45 -0
  52. data/lib/bundler/audit/version.rb +1 -1
  53. data/spec/advisory_spec.rb +14 -7
  54. data/spec/bundle/secure/Gemfile +1 -1
  55. data/spec/database_spec.rb +23 -1
  56. data/spec/integration_spec.rb +44 -29
  57. data/spec/rake_task_spec.rb +35 -0
  58. data/spec/spec_helper.rb +11 -3
  59. metadata +76 -33
  60. data/lib/bundler/audit/vendored_time.rb +0 -9
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 37d67a169ac19c5c1b329c949c4af7dd044876bd
4
- data.tar.gz: efbdd7e8335a6f685f77f45bfa6e4d3f4f10804f
3
+ metadata.gz: 61f5df0b26d555b3c6090841a2e650dc5727dfc8
4
+ data.tar.gz: 2b8d065557c8713ced0d20ece4733656def2c4e1
5
5
  SHA512:
6
- metadata.gz: c09b134df68524a62017773ca38bfb95cb10a9cd91a46fde8ba3686fd85910231cc85e9a463b9cd1fb925084311780121b1564e213b108aa2729e5d67f87ca2c
7
- data.tar.gz: 966ebb4387b593babd08f303530c7f2f32d7771e622d0371dd687222ee4f12d8f49167c8dcff091ce3c6534fe1fcdb200cdbe0b1cfa5e865cb67ceb078ee6abc
6
+ metadata.gz: 43deec103a419b873f440cffcab2e681a3dc2f7810588d57d78efb180ab46c902e9b31888aab6dd8793620a97a4bf5e3775b5f404a80d6cb535d74622538ec94
7
+ data.tar.gz: dd7976caed4e730d05d6d45dc5db2c5b7c65b97930112c401a2e5eecf561549ae2ab677bf741cdae2a9f1b3dba694a87d0edd48967f3b416975220ee60ecc380
data/.ruby-gemset ADDED
@@ -0,0 +1 @@
1
+ bundler-audit
data/.ruby-version ADDED
@@ -0,0 +1 @@
1
+ ruby-2.1.1-p0
data/.travis.yml CHANGED
@@ -3,3 +3,5 @@ rvm:
3
3
  - 1.9.2
4
4
  - 1.9.3
5
5
  - 2.0.0
6
+ - 2.1.0
7
+ - 2.1.1
data/ChangeLog.md CHANGED
@@ -1,3 +1,13 @@
1
+ ### mrjoy-0.3.3 / 2014-04-15
2
+
3
+ * Fix development-mode code loading issue.
4
+ * Update Travis config to include Ruby 2.1.0 and 2.1.1.
5
+ * Improve test suite to 90+% code coverage.
6
+ * Fix a couple Ruby 1.9-isms.
7
+ * Freshen included vulnerability DB.
8
+ * Incorporate upstream changes, including fix for Bundler-vendored Thor
9
+ creating a conflict.
10
+
1
11
  ### mrjoy-0.3.2 / 2013-11-04
2
12
 
3
13
  * Fix for [serious issue](https://github.com/rubysec/bundler-audit/issues/48)
@@ -14,6 +24,14 @@
14
24
  * Make regression test more resilient and more bulletproof.
15
25
  * Integrate grosser's mechanism for [DRYing up tests a bit](https://github.com/grosser/bundler-audit/commit/8568f936fe86eb92c95d63ef3c0a33bffd3aeee9).
16
26
 
27
+ ### 0.3.1 / 2013-12-03
28
+
29
+ * Store the timestamp of when `data/ruby-advisory-db` was last updated in
30
+ `data/ruby-advisory-db.ts`.
31
+ * Use `data/ruby-advisory-db.ts` instead of the creation time of the
32
+ `dataruby-advisory-db` directory, which is always the install time
33
+ of the rubygem.
34
+
17
35
  ### 0.3.0 / 2013-10-31
18
36
 
19
37
  * Added {Bundler::Audit::Database.update!} which uses `git` to download
data/Gemfile CHANGED
@@ -8,7 +8,7 @@ group :development do
8
8
  gem 'rake', '~> 10.0', :require => false
9
9
  gem 'kramdown', '~> 0.14'
10
10
 
11
- gem 'rubygems-tasks', '~> 0.2'
11
+ gem 'rubygems-tasks', '~> 0.2', :require => false
12
12
  gem 'rspec', '~> 2.4', :require => false
13
13
  gem 'yard', '~> 0.8', :require => false
14
14
  gem 'simplecov', '~> 0.7', :require => false
data/README.md CHANGED
@@ -30,6 +30,7 @@ Patch-level verification for [Bundler][bundler].
30
30
  quality, and easier contribution.
31
31
  * Simplified code (see CodeClimate results) to enable more easily reasoning
32
32
  about the code.
33
+ * Improve the upstream version's excellent 95.82% C1 covde coverage to 100%.
33
34
 
34
35
  ## Synopsis
35
36
 
@@ -122,6 +123,8 @@ Update the [ruby-advisory-db] that `bundle-audit` uses:
122
123
 
123
124
  ## Requirements
124
125
 
126
+ * [RubyGems] >= 1.8
127
+ * [thor] ~> 0.18
125
128
  * [bundler] ~> 1.2
126
129
  * [RubyGems] >= 1.8
127
130
 
@@ -160,8 +163,8 @@ GNU General Public License for more details.
160
163
  You should have received a copy of the GNU General Public License
161
164
  along with mrjoy-bundler-audit. If not, see <http://www.gnu.org/licenses/>.
162
165
 
166
+ [RubyGems]: https://rubygems.org
167
+ [thor]: http://whatisthor.com/
163
168
  [bundler]: https://github.com/carlhuda/bundler#readme
164
169
 
165
170
  [OSVDB]: http://osvdb.org/
166
-
167
- [RubyGems]: https://rubygems.org
data/Rakefile CHANGED
@@ -11,7 +11,7 @@ rescue LoadError => e
11
11
  end
12
12
 
13
13
  begin
14
- Bundler.setup(:development)
14
+ Bundler.setup(:default, :development)
15
15
  rescue Bundler::BundlerError => e
16
16
  warn e.message
17
17
  warn "Run `bundle install` to install missing gems."
@@ -19,6 +19,7 @@ rescue Bundler::BundlerError => e
19
19
  end
20
20
 
21
21
  require 'rake'
22
+ require 'time'
22
23
 
23
24
  require 'rubygems/tasks'
24
25
  Gem::Tasks.new
@@ -26,25 +27,18 @@ Gem::Tasks.new
26
27
  namespace :db do
27
28
  desc 'Updates data/ruby-advisory-db'
28
29
  task :update do
29
- vendored_ctime = nil
30
+ timestamp = nil
31
+
30
32
  chdir 'data/ruby-advisory-db' do
31
33
  sh 'git', 'pull', 'origin', 'master'
32
- vendored_ctime = `git log --pretty="%cd" -1`.chomp
33
- end
34
- File.open("lib/bundler/audit/vendored_time.rb", "w") do |fh|
35
- fh.write(%Q{
36
- # WARNING: DO NOT EDIT THIS FILE BY HAND. IT IS AUTO-GENERATED!
37
- module Bundler
38
- module Audit
39
- class Database
40
- VENDORED_REPO_CTIME = Time.parse("#{vendored_ctime}")
41
- end
42
- end
43
- end
44
- })
34
+
35
+ File.open('../ruby-advisory-db.ts','w') do |file|
36
+ file.write Time.parse(`git log --pretty="%cd" -1`).utc
37
+ end
45
38
  end
46
39
 
47
40
  sh 'git', 'commit', 'data/ruby-advisory-db',
41
+ 'data/ruby-advisory-db.ts',
48
42
  '-m', 'Updated ruby-advisory-db'
49
43
  end
50
44
  end
@@ -58,13 +52,7 @@ namespace :spec do
58
52
 
59
53
  %w[secure unpatched_gems insecure_sources].each do |bundle|
60
54
  chdir(File.join(root,bundle)) do
61
- begin
62
- sh 'BUNDLE_BIN_PATH="" BUNDLE_GEMFILE="" RUBYOPT="" bundle install --path ../../../vendor/bundle'
63
- rescue
64
- exit(1) if(!File.exist?('Gemfile.lock'))
65
- puts "Looks like Gemfile may have been updated. Attempting to update things."
66
- sh 'BUNDLE_BIN_PATH="" BUNDLE_GEMFILE="" RUBYOPT="" bundle update'
67
- end
55
+ sh 'BUNDLE_BIN_PATH="" BUNDLE_GEMFILE="" RUBYOPT="" bundle install --path ../../../vendor/bundle'
68
56
  end
69
57
  end
70
58
  end
@@ -77,3 +65,8 @@ task :default => :spec
77
65
  require 'yard'
78
66
  YARD::Rake::YardocTask.new
79
67
  task :doc => :yard
68
+
69
+ require './lib/bundler/audit/task'
70
+ Bundler::Audit::Task.new do |r|
71
+ r.verbose = true
72
+ end
@@ -12,3 +12,13 @@ Thanks,
12
12
  * [Larry W. Cashdollar](http://vapid.dhs.org/)
13
13
  * [Michael Grosser](https://github.com/grosser)
14
14
  * [Sascha Korth](https://github.com/skorth)
15
+ * [David Radcliffe](https://github.com/dwradcliffe)
16
+ * [Jörg Schiller](https://github.com/joergschiller)
17
+ * [Derek Prior](https://github.com/derekprior)
18
+ * [Joel Chippindale](https://github.com/mocoso)
19
+ * [Josef Šimánek](https://github.com/simi)
20
+ * [Amiel Martin](https://github.com/amiel)
21
+ * [Eric Hodel](https://github.com/drbrain)
22
+ * [Jeremy Olliver](https://github.com/jeremyolliver)
23
+ * [Vasily Vasinov](https://github.com/vasinov)
24
+ * [Phill MV](https://twitter.com/phillmv)
@@ -0,0 +1,20 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-6415
5
+ osvdb: 100524
6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/9WiRn2nhfq0
7
+ title: XSS Vulnerability in number_to_currency
8
+ date: 2013-12-03
9
+
10
+ description: |
11
+ There is an XSS vulnerability in the number_to_currency helper in Ruby on Raile.
12
+ The number_to_currency helper allows users to nicely format a numeric value. One
13
+ of the parameters to the helper (unit) is not escaped correctly. Applications
14
+ which pass user controlled data as the unit parameter are vulnerable to an XSS attack.
15
+
16
+ cvss_v2:
17
+
18
+ patched_versions:
19
+ - ~> 3.2.16
20
+ - ">= 4.0.2"
@@ -0,0 +1,21 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-6414
5
+ osvdb: 100525
6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/A-ebV4WxzKg
7
+ title: Denial of Service Vulnerability in Action View
8
+ date: 2013-12-03
9
+
10
+ description: |
11
+ There is a denial of service vulnerability in the header handling component of
12
+ Action View.
13
+
14
+ cvss_v2:
15
+
16
+ unaffected_versions:
17
+ - ~> 2.3.0
18
+
19
+ patched_versions:
20
+ - ~> 3.2.16
21
+ - ">= 4.0.2"
@@ -0,0 +1,27 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-6416
5
+ osvdb: 100526
6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/5ZI1-H5OoIM
7
+ title: XSS Vulnerability in simple_format helper
8
+ date: 2013-12-03
9
+
10
+ description: |
11
+ There is a vulnerability in the simple_format helper in Ruby on Rails.
12
+ The simple_format helper converts user supplied text into html text
13
+ which is intended to be safe for display. A change made to the
14
+ implementation of this helper means that any user provided HTML
15
+ attributes will not be escaped correctly. As a result of this error,
16
+ applications which pass user-controlled data to be included as html
17
+ attributes will be vulnerable to an XSS attack.
18
+
19
+ cvss_v2:
20
+
21
+ unaffected_versions:
22
+ - ~> 2.3.0
23
+ - ~> 3.1.0
24
+ - ~> 3.2.0
25
+
26
+ patched_versions:
27
+ - ">= 4.0.2"
@@ -0,0 +1,24 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-6417
5
+ osvdb: 100527
6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4
7
+ title: Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)
8
+ date: 2013-12-03
9
+
10
+ description: |
11
+ The prior fix to CVE-2013-0155 was incomplete and the use of common
12
+ 3rd party libraries can accidentally circumvent the protection. Due
13
+ to the way that Rack::Request and Rails::Request interact, it is
14
+ possible for a 3rd party or custom rack middleware to parse the
15
+ parameters insecurely and store them in the same key that Rails uses
16
+ for its own parameters. In the event that happens the application
17
+ will receive unsafe parameters and could be vulnerable to the earlier
18
+ vulnerability.
19
+
20
+ cvss_v2:
21
+
22
+ patched_versions:
23
+ - ~> 3.2.16
24
+ - ">= 4.0.2"
@@ -0,0 +1,22 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2013-4491
5
+ osvdb: 100528
6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
7
+ title: Reflective XSS Vulnerability in Ruby on Rails
8
+ date: 2013-12-03
9
+
10
+ description: |
11
+ There is a vulnerability in the internationalization component of Ruby on
12
+ Rails. Under certain common configurations an attacker can provide specially
13
+ crafted input which will execute a reflective XSS attack.
14
+
15
+ The root cause of this issue is a vulnerability in the i18n gem which has
16
+ been assigned the identifier CVE-2013-4492.
17
+
18
+ cvss_v2:
19
+
20
+ patched_versions:
21
+ - ~> 3.2.16
22
+ - ">= 4.0.2"
@@ -0,0 +1,24 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2014-0081
5
+ osvdb: 103439
6
+ url: http://osvdb.org/show/osvdb/103439
7
+ title: XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human
8
+ date: 2014-02-18
9
+
10
+ description: |
11
+ Ruby on Rails contains a flaw that allows a cross-site scripting (XSS) attack.
12
+ This flaw exists because the actionpack/lib/action_view/helpers/number_helper.rb
13
+ script does not validate input to the 'number_to_currency', 'number_to_percentage',
14
+ and 'number_to_human' helpers before returning it to users. This may allow a
15
+ remote attacker to create a specially crafted request that would execute arbitrary
16
+ script code in a user's browser session within the trust relationship between
17
+ their browser and the server.
18
+
19
+ cvss_v2:
20
+
21
+ patched_versions:
22
+ - ~> 3.2.17
23
+ - ~> 4.0.3
24
+ - ">= 4.1.0.beta2"
@@ -0,0 +1,22 @@
1
+ ---
2
+ gem: actionpack
3
+ framework: rails
4
+ cve: 2014-0082
5
+ osvdb: 103440
6
+ url: http://osvdb.org/show/osvdb/103440
7
+ title: Denial of Service Vulnerability in Action View when using render :text
8
+ date: 2014-02-18
9
+
10
+ description: |
11
+ Ruby on Rails contains a flaw in actionpack/lib/action_view/template/text.rb
12
+ in the text rendering component of Action View that is triggered when
13
+ handling MIME types that are converted to symbols. This may allow a
14
+ remote attacker to cause a denial of service.
15
+
16
+ cvss_v2:
17
+
18
+ unaffected_versions:
19
+ - ~> 4.0.0
20
+
21
+ patched_versions:
22
+ - ">= 3.2.17"
@@ -0,0 +1,23 @@
1
+ ---
2
+ gem: activerecord
3
+ framework: rails
4
+ cve: 2014-0080
5
+ osvdb: 103438
6
+ url: http://osvdb.org/show/osvdb/103438
7
+ title: Data Injection Vulnerability in Active Record
8
+ date: 2014-02-18
9
+
10
+ description: |
11
+ Ruby on Rails contains a flaw in connection_adapters/postgresql/cast.rb
12
+ in Active Record. This issue may allow a remote attacker to inject data
13
+ into PostgreSQL array columns via a specially crafted string.
14
+
15
+ cvss_v2:
16
+
17
+ unaffected_versions:
18
+ - "< 3.2.0"
19
+ - ~> 3.2.0
20
+
21
+ patched_versions:
22
+ - ~> 4.0.3
23
+ - ">= 4.1.0.beta2"
@@ -0,0 +1,15 @@
1
+ ---
2
+ gem: Arabic-Prawn
3
+ osvdb: 104365
4
+ url: http://osvdb.org/show/osvdb/104365
5
+ title: Arabic-Prawn Gem for Ruby contains a flaw
6
+ date: 2014-03-10
7
+
8
+ description: |
9
+ Arabic Prawn Gem for Ruby contains a flaw in the lib/string_utf_support.rb
10
+ file. The issue is due to the program failing to sanitize user input. This may
11
+ allow a remote attacker to inject arbitrary commands.
12
+
13
+ cvss_v2:
14
+
15
+ patched_versions:
@@ -8,8 +8,8 @@ date: 2013-10-22
8
8
  description: Cocaine Gem for Ruby contains a flaw that is due to the method
9
9
  of variable interpolation used by the program. With a specially crafted
10
10
  object, a context-dependent attacker can execute arbitrary commands.
11
- cvss_v2:
11
+ cvss_v2: 6.8
12
12
  unaffected_versions:
13
- - ~> 0.3.0
13
+ - < 0.4.0
14
14
  patched_versions:
15
15
  - '>= 0.5.3'
@@ -10,7 +10,7 @@ description: |
10
10
  context-dependent attacker to potentially execute arbitrary code.
11
11
  date: 2013-01-09
12
12
 
13
- cvss_v2: 9.3
13
+ cvss_v2: 7.5
14
14
 
15
15
  patched_versions:
16
16
  - ">= 0.3.2"
@@ -8,5 +8,5 @@ date: 2013-03-12
8
8
 
9
9
  description: Curl Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via the URL. This may allow a context-dependent attacker to potentially execute arbitrary commands by injecting them via a semi-colon (;).
10
10
 
11
- cvss_v2: 9.3
11
+ cvss_v2: 7.5
12
12
 
@@ -0,0 +1,11 @@
1
+ ---
2
+ gem: echor
3
+ osvdb: 102129
4
+ url: http://osvdb.org/show/osvdb/102129
5
+ title: Echor Gem for Ruby contains a flaw
6
+ date: 2014-01-14
7
+ description: Echor Gem for Ruby contains a flaw in backplane.rb in the perform_request function that is triggered when
8
+ a semi-colon (;) is injected into a username or password. This may allow a context-dependent attacker to inject
9
+ arbitrary commands if the gem is used in a rails application.
10
+ cvss_v2:
11
+ patched_versions:
@@ -0,0 +1,10 @@
1
+ ---
2
+ gem: echor
3
+ osvdb: 102130
4
+ url: http://osvdb.org/show/osvdb/102130
5
+ title: Echor Gem for Ruby contains a flaw
6
+ date: 2014-01-14
7
+ description: Echor Gem for Ruby contains a flaw that is due to the program exposing credential information in the
8
+ system process listing. This may allow a local attacker to gain access to plaintext credential information.
9
+ cvss_v2:
10
+ patched_versions:
@@ -0,0 +1,14 @@
1
+ ---
2
+ gem: gitlab-grit
3
+ cve: 2013-4489
4
+ osvdb: 99370
5
+ url: http://www.osvdb.org/show/osvdb/99370
6
+ title: GitLab Grit Gem for Ruby contains a flaw
7
+ date: 2013-11-04
8
+ description: GitLab Grit Gem for Ruby contains a flaw in the app/contexts/search_context.rb script.
9
+ The issue is triggered when input passed via the code search box is not properly sanitized,
10
+ which allows strings to be evaluated by the Bourne shell. This may allow a remote attacker to
11
+ execute arbitrary commands.
12
+ cvss_v2:
13
+ patched_versions:
14
+ - '>= 2.6.1'
@@ -1,19 +1,14 @@
1
1
  ---
2
2
  gem: httparty
3
- cve: 2013-1802
3
+ cve: 2013-1801
4
4
  osvdb: 90741
5
5
  url: http://osvdb.org/show/osvdb/90741
6
- title:
7
- httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
6
+ title: httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
8
7
  date: 2013-01-14
9
-
10
8
  description: |
11
9
  httparty Gem for Ruby contains a flaw that is triggered when a type casting
12
10
  error occurs during the parsing of parameters. This may allow a
13
11
  context-dependent attacker to potentially execute arbitrary code.
14
-
15
- cvss_v2: 9.3
16
-
12
+ cvss_v2: 7.5
17
13
  patched_versions:
18
14
  - ">= 0.10.0"
19
-
@@ -0,0 +1,17 @@
1
+ ---
2
+ gem: i18n
3
+ cve: 2013-4492
4
+ osvdb: 100528
5
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
6
+ title: i18n missing translation error message XSS
7
+ date: 2013-12-03
8
+
9
+ description: |
10
+ The HTML exception message raised by I18n::MissingTranslation fails
11
+ to escape the keys.
12
+
13
+ cvss_v2: 4.3
14
+
15
+ patched_versions:
16
+ - ~> 0.5.1
17
+ - '>= 0.6.6'
@@ -0,0 +1,12 @@
1
+ ---
2
+ gem: nokogiri
3
+ cve: 2013-6460
4
+ osvdb: 101179
5
+ url: http://www.osvdb.org/show/osvdb/101179
6
+ title: Nokogiri Gem for JRuby Crafted XML Document Handling Infinite Loop Remote DoS
7
+ date: 2013-12-14
8
+ description: Nokogiri Gem for JRuby contains a flaw that may allow a remote denial of service. The issue is triggered when handling a specially crafted XML document, which can result in an infinite loop. This may allow a context-dependent attacker to crash the server.
9
+ cvss_v2:
10
+ patched_versions:
11
+ - ~> 1.5.11
12
+ - ">= 1.6.1"
@@ -0,0 +1,15 @@
1
+ ---
2
+ gem: nokogiri
3
+ cve: 2013-6461
4
+ osvdb: 101458
5
+ url: http://www.osvdb.org/show/osvdb/101458
6
+ title: Nokogiri Gem for Ruby External Entity (XXE) Expansion Remote DoS
7
+ date: 2013-12-14
8
+ description: Nokogiri gem for Ruby contains an flaw that is triggered during the parsing of XML data.
9
+ The issue is due to an incorrectly configured XML parser accepting XML external entities from
10
+ an untrusted source. By sending specially crafted XML data, a remote attacker can cause an infinite
11
+ loop and crash the program.
12
+ cvss_v2:
13
+ patched_versions:
14
+ - ~> 1.5.11
15
+ - ">= 1.6.1"
@@ -11,7 +11,7 @@ description: |
11
11
  to execute arbitrary code. This vulnerability has to do with type casting
12
12
  during parsing, and is related to CVE-2013-0156.
13
13
 
14
- cvss_v2: 10.0
14
+ cvss_v2: 7.5
15
15
 
16
16
  patched_versions:
17
17
  - ~> 1.0.3
@@ -0,0 +1,22 @@
1
+ ---
2
+ gem: omniauth-facebook
3
+ cve: 2013-4562
4
+ osvdb: 99693
5
+ url: http://www.osvdb.org/show/osvdb/99693
6
+ title: omniauth-facebook Gem for Ruby Unspecified CSRF
7
+ date: 2013-11-12
8
+
9
+ description: |
10
+ omniauth-facebook Gem for Ruby contains a flaw as HTTP requests do not
11
+ require multiple steps, explicit confirmation, or a unique token when
12
+ performing certain sensitive actions. By tricking a user into following
13
+ a specially crafted link, a context-dependent attacker can perform a
14
+ Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to
15
+ perform an unspecified action.
16
+
17
+ cvss_v2: 6.8
18
+
19
+ patched_versions:
20
+ - ">= 1.5.0"
21
+ unaffected_versions:
22
+ - "<= 1.4.0"
@@ -0,0 +1,17 @@
1
+ ---
2
+ gem: omniauth-facebook
3
+ cve: 2013-4593
4
+ osvdb: 99888
5
+ url: http://www.osvdb.org/show/osvdb/99888
6
+ title: omniauth-facebook Gem for Ruby Insecure Access Token Handling Authentication Bypass
7
+ date: 2013-11-14
8
+
9
+ description: |
10
+ omniauth-facebook Gem for Ruby contains a flaw that is due to the application
11
+ supporting passing the access token via the URL. This may allow a remote
12
+ attacker to bypass authentication and authenticate as another user.
13
+
14
+ cvss_v2: 6.8
15
+
16
+ patched_versions:
17
+ - ">= 1.5.1"
@@ -0,0 +1,13 @@
1
+ ---
2
+ gem: paperclip
3
+ osvdb: 103151
4
+ url: http://osvdb.org/show/osvdb/103151
5
+ title: Paperclip Gem for Ruby contains a flaw
6
+ date: 2014-01-31
7
+ description: Paperclip Gem for Ruby contains a flaw that is due to the application failing to properly
8
+ validate the file extension, instead only validating the Content-Type header during file uploads.
9
+ This may allow a remote attacker to bypass restrictions on file types for uploaded files by
10
+ spoofing the content-type.
11
+ cvss_v2:
12
+ patched_versions:
13
+ - ">= 4.0.0"
@@ -0,0 +1,12 @@
1
+ ---
2
+ gem: paratrooper-newrelic
3
+ cve: 2014-1234
4
+ osvdb: 101839
5
+ url: http://www.osvdb.org/show/osvdb/101839
6
+ title: Paratrooper-newrelic Gem for Ruby contains a flaw
7
+ date: 2014-01-08
8
+ description: Paratrooper-newrelic Gem for Ruby contains a flaw in /lib/paratrooper-newrelic.rb.
9
+ The issue is triggered when the script exposes the API key, allowing a local attacker to
10
+ gain access to it by monitoring the process tree.
11
+ cvss_v2: 2.1
12
+ patched_versions:
@@ -0,0 +1,13 @@
1
+ ---
2
+ gem: paratrooper-pingdom
3
+ cve: 2014-1233
4
+ osvdb: 101847
5
+ url: http://www.osvdb.org/show/osvdb/101847
6
+ title: Paratrooper-pingdom Gem for Ruby contains a flaw
7
+ date: 2013-12-26
8
+ description: paratrooper-pingdom Gem for Ruby contains a flaw in /lib/paratrooper-pingdom.rb.
9
+ The issue is triggered when the script exposes API login credentials, allowing a local
10
+ attacker to gain access to the API key, username, and password for the API login by
11
+ monitoring the process tree.
12
+ cvss_v2: 2.1
13
+ patched_versions:
@@ -14,7 +14,7 @@ description: |
14
14
  code. This attack is more practical against 'cloud' users as intra-cloud
15
15
  latencies are sufficiently low to make the attack viable.
16
16
 
17
- cvss_v2: 7.6
17
+ cvss_v2: 5.1
18
18
  patched_versions:
19
19
  - ~> 1.1.6
20
20
  - ~> 1.2.8
@@ -0,0 +1,20 @@
1
+ ---
2
+ gem: rbovirt
3
+ cve: 2014-0036
4
+ osvdb: 104080
5
+ url: http://osvdb.org/show/osvdb/104080
6
+ title: rbovirt Gem for Ruby contains a flaw
7
+ date: 2014-03-05
8
+
9
+ description: |
10
+ rbovirt Gem for Ruby contains a flaw related to certificate validation.
11
+ The issue is due to the program failing to validate SSL certificates. This may
12
+ allow an attacker with access to network traffic (e.g. MiTM, DNS cache
13
+ poisoning) to spoof the SSL server via an arbitrary certificate that appears
14
+ valid. Such an attack would allow for the interception of sensitive traffic,
15
+ and potentially allow for the injection of content into the SSL stream.
16
+
17
+ cvss_v2:
18
+
19
+ patched_versions:
20
+ - '>= 0.0.24'