mrjoy-bundler-audit 0.3.2 → 0.3.3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.ruby-gemset +1 -0
- data/.ruby-version +1 -0
- data/.travis.yml +2 -0
- data/ChangeLog.md +18 -0
- data/Gemfile +1 -1
- data/README.md +5 -2
- data/Rakefile +15 -22
- data/data/ruby-advisory-db/CONTRIBUTORS.md +10 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100524.yml +20 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100525.yml +21 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100526.yml +27 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100527.yml +24 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-100528.yml +22 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-103439.yml +24 -0
- data/data/ruby-advisory-db/gems/actionpack/OSVDB-103440.yml +22 -0
- data/data/ruby-advisory-db/gems/activerecord/OSVDB-103438.yml +23 -0
- data/data/ruby-advisory-db/gems/arabic-prawn/OSVDB-104365.yml +15 -0
- data/data/ruby-advisory-db/gems/cocaine/OSVDB-98835.yml +2 -2
- data/data/ruby-advisory-db/gems/crack/OSVDB-90742.yml +1 -1
- data/data/ruby-advisory-db/gems/curl/OSVDB-91230.yml +1 -1
- data/data/ruby-advisory-db/gems/echor/OSVDB-102129.yml +11 -0
- data/data/ruby-advisory-db/gems/echor/OSVDB-102130.yml +10 -0
- data/data/ruby-advisory-db/gems/gitlab-grit/OSVDB-99370.yml +14 -0
- data/data/ruby-advisory-db/gems/httparty/OSVDB-90741.yml +3 -8
- data/data/ruby-advisory-db/gems/i18n/OSVDB-100528.yml +17 -0
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101179.yml +12 -0
- data/data/ruby-advisory-db/gems/nokogiri/OSVDB-101458.yml +15 -0
- data/data/ruby-advisory-db/gems/nori/OSVDB-90196.yml +1 -1
- data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99693.yml +22 -0
- data/data/ruby-advisory-db/gems/omniauth-facebook/OSVDB-99888.yml +17 -0
- data/data/ruby-advisory-db/gems/paperclip/OSVDB-103151.yml +13 -0
- data/data/ruby-advisory-db/gems/paratrooper-newrelic/OSVDB-101839.yml +12 -0
- data/data/ruby-advisory-db/gems/paratrooper-pingdom/OSVDB-101847.yml +13 -0
- data/data/ruby-advisory-db/gems/rack/OSVDB-89939.yml +1 -1
- data/data/ruby-advisory-db/gems/rbovirt/OSVDB-104080.yml +20 -0
- data/data/ruby-advisory-db/gems/rgpg/OSVDB-95948.yml +2 -1
- data/data/ruby-advisory-db/gems/spree/OSVDB-91216.yml +3 -2
- data/data/ruby-advisory-db/gems/spree/OSVDB-91217.yml +3 -2
- data/data/ruby-advisory-db/gems/spree/OSVDB-91218.yml +3 -2
- data/data/ruby-advisory-db/gems/spree/OSVDB-91219.yml +3 -2
- data/data/ruby-advisory-db/gems/sprout/OSVDB-100598.yml +14 -0
- data/data/ruby-advisory-db/gems/webbynode/OSVDB-100920.yml +11 -0
- data/data/ruby-advisory-db/gems/will_paginate/OSVDB-101138.yml +15 -0
- data/data/ruby-advisory-db/spec/advisory_example.rb +3 -3
- data/data/ruby-advisory-db/spec/gems_spec.rb +3 -4
- data/data/ruby-advisory-db.ts +1 -0
- data/gemspec.yml +2 -1
- data/lib/bundler/audit/cli.rb +7 -8
- data/lib/bundler/audit/database.rb +7 -5
- data/lib/bundler/audit/task.rb +45 -0
- data/lib/bundler/audit/version.rb +1 -1
- data/spec/advisory_spec.rb +14 -7
- data/spec/bundle/secure/Gemfile +1 -1
- data/spec/database_spec.rb +23 -1
- data/spec/integration_spec.rb +44 -29
- data/spec/rake_task_spec.rb +35 -0
- data/spec/spec_helper.rb +11 -3
- metadata +76 -33
- data/lib/bundler/audit/vendored_time.rb +0 -9
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 61f5df0b26d555b3c6090841a2e650dc5727dfc8
|
4
|
+
data.tar.gz: 2b8d065557c8713ced0d20ece4733656def2c4e1
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 43deec103a419b873f440cffcab2e681a3dc2f7810588d57d78efb180ab46c902e9b31888aab6dd8793620a97a4bf5e3775b5f404a80d6cb535d74622538ec94
|
7
|
+
data.tar.gz: dd7976caed4e730d05d6d45dc5db2c5b7c65b97930112c401a2e5eecf561549ae2ab677bf741cdae2a9f1b3dba694a87d0edd48967f3b416975220ee60ecc380
|
data/.ruby-gemset
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
bundler-audit
|
data/.ruby-version
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
ruby-2.1.1-p0
|
data/.travis.yml
CHANGED
data/ChangeLog.md
CHANGED
@@ -1,3 +1,13 @@
|
|
1
|
+
### mrjoy-0.3.3 / 2014-04-15
|
2
|
+
|
3
|
+
* Fix development-mode code loading issue.
|
4
|
+
* Update Travis config to include Ruby 2.1.0 and 2.1.1.
|
5
|
+
* Improve test suite to 90+% code coverage.
|
6
|
+
* Fix a couple Ruby 1.9-isms.
|
7
|
+
* Freshen included vulnerability DB.
|
8
|
+
* Incorporate upstream changes, including fix for Bundler-vendored Thor
|
9
|
+
creating a conflict.
|
10
|
+
|
1
11
|
### mrjoy-0.3.2 / 2013-11-04
|
2
12
|
|
3
13
|
* Fix for [serious issue](https://github.com/rubysec/bundler-audit/issues/48)
|
@@ -14,6 +24,14 @@
|
|
14
24
|
* Make regression test more resilient and more bulletproof.
|
15
25
|
* Integrate grosser's mechanism for [DRYing up tests a bit](https://github.com/grosser/bundler-audit/commit/8568f936fe86eb92c95d63ef3c0a33bffd3aeee9).
|
16
26
|
|
27
|
+
### 0.3.1 / 2013-12-03
|
28
|
+
|
29
|
+
* Store the timestamp of when `data/ruby-advisory-db` was last updated in
|
30
|
+
`data/ruby-advisory-db.ts`.
|
31
|
+
* Use `data/ruby-advisory-db.ts` instead of the creation time of the
|
32
|
+
`dataruby-advisory-db` directory, which is always the install time
|
33
|
+
of the rubygem.
|
34
|
+
|
17
35
|
### 0.3.0 / 2013-10-31
|
18
36
|
|
19
37
|
* Added {Bundler::Audit::Database.update!} which uses `git` to download
|
data/Gemfile
CHANGED
@@ -8,7 +8,7 @@ group :development do
|
|
8
8
|
gem 'rake', '~> 10.0', :require => false
|
9
9
|
gem 'kramdown', '~> 0.14'
|
10
10
|
|
11
|
-
gem 'rubygems-tasks', '~> 0.2'
|
11
|
+
gem 'rubygems-tasks', '~> 0.2', :require => false
|
12
12
|
gem 'rspec', '~> 2.4', :require => false
|
13
13
|
gem 'yard', '~> 0.8', :require => false
|
14
14
|
gem 'simplecov', '~> 0.7', :require => false
|
data/README.md
CHANGED
@@ -30,6 +30,7 @@ Patch-level verification for [Bundler][bundler].
|
|
30
30
|
quality, and easier contribution.
|
31
31
|
* Simplified code (see CodeClimate results) to enable more easily reasoning
|
32
32
|
about the code.
|
33
|
+
* Improve the upstream version's excellent 95.82% C1 covde coverage to 100%.
|
33
34
|
|
34
35
|
## Synopsis
|
35
36
|
|
@@ -122,6 +123,8 @@ Update the [ruby-advisory-db] that `bundle-audit` uses:
|
|
122
123
|
|
123
124
|
## Requirements
|
124
125
|
|
126
|
+
* [RubyGems] >= 1.8
|
127
|
+
* [thor] ~> 0.18
|
125
128
|
* [bundler] ~> 1.2
|
126
129
|
* [RubyGems] >= 1.8
|
127
130
|
|
@@ -160,8 +163,8 @@ GNU General Public License for more details.
|
|
160
163
|
You should have received a copy of the GNU General Public License
|
161
164
|
along with mrjoy-bundler-audit. If not, see <http://www.gnu.org/licenses/>.
|
162
165
|
|
166
|
+
[RubyGems]: https://rubygems.org
|
167
|
+
[thor]: http://whatisthor.com/
|
163
168
|
[bundler]: https://github.com/carlhuda/bundler#readme
|
164
169
|
|
165
170
|
[OSVDB]: http://osvdb.org/
|
166
|
-
|
167
|
-
[RubyGems]: https://rubygems.org
|
data/Rakefile
CHANGED
@@ -11,7 +11,7 @@ rescue LoadError => e
|
|
11
11
|
end
|
12
12
|
|
13
13
|
begin
|
14
|
-
Bundler.setup(:development)
|
14
|
+
Bundler.setup(:default, :development)
|
15
15
|
rescue Bundler::BundlerError => e
|
16
16
|
warn e.message
|
17
17
|
warn "Run `bundle install` to install missing gems."
|
@@ -19,6 +19,7 @@ rescue Bundler::BundlerError => e
|
|
19
19
|
end
|
20
20
|
|
21
21
|
require 'rake'
|
22
|
+
require 'time'
|
22
23
|
|
23
24
|
require 'rubygems/tasks'
|
24
25
|
Gem::Tasks.new
|
@@ -26,25 +27,18 @@ Gem::Tasks.new
|
|
26
27
|
namespace :db do
|
27
28
|
desc 'Updates data/ruby-advisory-db'
|
28
29
|
task :update do
|
29
|
-
|
30
|
+
timestamp = nil
|
31
|
+
|
30
32
|
chdir 'data/ruby-advisory-db' do
|
31
33
|
sh 'git', 'pull', 'origin', 'master'
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
# WARNING: DO NOT EDIT THIS FILE BY HAND. IT IS AUTO-GENERATED!
|
37
|
-
module Bundler
|
38
|
-
module Audit
|
39
|
-
class Database
|
40
|
-
VENDORED_REPO_CTIME = Time.parse("#{vendored_ctime}")
|
41
|
-
end
|
42
|
-
end
|
43
|
-
end
|
44
|
-
})
|
34
|
+
|
35
|
+
File.open('../ruby-advisory-db.ts','w') do |file|
|
36
|
+
file.write Time.parse(`git log --pretty="%cd" -1`).utc
|
37
|
+
end
|
45
38
|
end
|
46
39
|
|
47
40
|
sh 'git', 'commit', 'data/ruby-advisory-db',
|
41
|
+
'data/ruby-advisory-db.ts',
|
48
42
|
'-m', 'Updated ruby-advisory-db'
|
49
43
|
end
|
50
44
|
end
|
@@ -58,13 +52,7 @@ namespace :spec do
|
|
58
52
|
|
59
53
|
%w[secure unpatched_gems insecure_sources].each do |bundle|
|
60
54
|
chdir(File.join(root,bundle)) do
|
61
|
-
|
62
|
-
sh 'BUNDLE_BIN_PATH="" BUNDLE_GEMFILE="" RUBYOPT="" bundle install --path ../../../vendor/bundle'
|
63
|
-
rescue
|
64
|
-
exit(1) if(!File.exist?('Gemfile.lock'))
|
65
|
-
puts "Looks like Gemfile may have been updated. Attempting to update things."
|
66
|
-
sh 'BUNDLE_BIN_PATH="" BUNDLE_GEMFILE="" RUBYOPT="" bundle update'
|
67
|
-
end
|
55
|
+
sh 'BUNDLE_BIN_PATH="" BUNDLE_GEMFILE="" RUBYOPT="" bundle install --path ../../../vendor/bundle'
|
68
56
|
end
|
69
57
|
end
|
70
58
|
end
|
@@ -77,3 +65,8 @@ task :default => :spec
|
|
77
65
|
require 'yard'
|
78
66
|
YARD::Rake::YardocTask.new
|
79
67
|
task :doc => :yard
|
68
|
+
|
69
|
+
require './lib/bundler/audit/task'
|
70
|
+
Bundler::Audit::Task.new do |r|
|
71
|
+
r.verbose = true
|
72
|
+
end
|
@@ -12,3 +12,13 @@ Thanks,
|
|
12
12
|
* [Larry W. Cashdollar](http://vapid.dhs.org/)
|
13
13
|
* [Michael Grosser](https://github.com/grosser)
|
14
14
|
* [Sascha Korth](https://github.com/skorth)
|
15
|
+
* [David Radcliffe](https://github.com/dwradcliffe)
|
16
|
+
* [Jörg Schiller](https://github.com/joergschiller)
|
17
|
+
* [Derek Prior](https://github.com/derekprior)
|
18
|
+
* [Joel Chippindale](https://github.com/mocoso)
|
19
|
+
* [Josef Šimánek](https://github.com/simi)
|
20
|
+
* [Amiel Martin](https://github.com/amiel)
|
21
|
+
* [Eric Hodel](https://github.com/drbrain)
|
22
|
+
* [Jeremy Olliver](https://github.com/jeremyolliver)
|
23
|
+
* [Vasily Vasinov](https://github.com/vasinov)
|
24
|
+
* [Phill MV](https://twitter.com/phillmv)
|
@@ -0,0 +1,20 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-6415
|
5
|
+
osvdb: 100524
|
6
|
+
url: https://groups.google.com/forum/#!topic/ruby-security-ann/9WiRn2nhfq0
|
7
|
+
title: XSS Vulnerability in number_to_currency
|
8
|
+
date: 2013-12-03
|
9
|
+
|
10
|
+
description: |
|
11
|
+
There is an XSS vulnerability in the number_to_currency helper in Ruby on Raile.
|
12
|
+
The number_to_currency helper allows users to nicely format a numeric value. One
|
13
|
+
of the parameters to the helper (unit) is not escaped correctly. Applications
|
14
|
+
which pass user controlled data as the unit parameter are vulnerable to an XSS attack.
|
15
|
+
|
16
|
+
cvss_v2:
|
17
|
+
|
18
|
+
patched_versions:
|
19
|
+
- ~> 3.2.16
|
20
|
+
- ">= 4.0.2"
|
@@ -0,0 +1,21 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-6414
|
5
|
+
osvdb: 100525
|
6
|
+
url: https://groups.google.com/forum/#!topic/ruby-security-ann/A-ebV4WxzKg
|
7
|
+
title: Denial of Service Vulnerability in Action View
|
8
|
+
date: 2013-12-03
|
9
|
+
|
10
|
+
description: |
|
11
|
+
There is a denial of service vulnerability in the header handling component of
|
12
|
+
Action View.
|
13
|
+
|
14
|
+
cvss_v2:
|
15
|
+
|
16
|
+
unaffected_versions:
|
17
|
+
- ~> 2.3.0
|
18
|
+
|
19
|
+
patched_versions:
|
20
|
+
- ~> 3.2.16
|
21
|
+
- ">= 4.0.2"
|
@@ -0,0 +1,27 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-6416
|
5
|
+
osvdb: 100526
|
6
|
+
url: https://groups.google.com/forum/#!topic/ruby-security-ann/5ZI1-H5OoIM
|
7
|
+
title: XSS Vulnerability in simple_format helper
|
8
|
+
date: 2013-12-03
|
9
|
+
|
10
|
+
description: |
|
11
|
+
There is a vulnerability in the simple_format helper in Ruby on Rails.
|
12
|
+
The simple_format helper converts user supplied text into html text
|
13
|
+
which is intended to be safe for display. A change made to the
|
14
|
+
implementation of this helper means that any user provided HTML
|
15
|
+
attributes will not be escaped correctly. As a result of this error,
|
16
|
+
applications which pass user-controlled data to be included as html
|
17
|
+
attributes will be vulnerable to an XSS attack.
|
18
|
+
|
19
|
+
cvss_v2:
|
20
|
+
|
21
|
+
unaffected_versions:
|
22
|
+
- ~> 2.3.0
|
23
|
+
- ~> 3.1.0
|
24
|
+
- ~> 3.2.0
|
25
|
+
|
26
|
+
patched_versions:
|
27
|
+
- ">= 4.0.2"
|
@@ -0,0 +1,24 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-6417
|
5
|
+
osvdb: 100527
|
6
|
+
url: https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4
|
7
|
+
title: Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)
|
8
|
+
date: 2013-12-03
|
9
|
+
|
10
|
+
description: |
|
11
|
+
The prior fix to CVE-2013-0155 was incomplete and the use of common
|
12
|
+
3rd party libraries can accidentally circumvent the protection. Due
|
13
|
+
to the way that Rack::Request and Rails::Request interact, it is
|
14
|
+
possible for a 3rd party or custom rack middleware to parse the
|
15
|
+
parameters insecurely and store them in the same key that Rails uses
|
16
|
+
for its own parameters. In the event that happens the application
|
17
|
+
will receive unsafe parameters and could be vulnerable to the earlier
|
18
|
+
vulnerability.
|
19
|
+
|
20
|
+
cvss_v2:
|
21
|
+
|
22
|
+
patched_versions:
|
23
|
+
- ~> 3.2.16
|
24
|
+
- ">= 4.0.2"
|
@@ -0,0 +1,22 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2013-4491
|
5
|
+
osvdb: 100528
|
6
|
+
url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
|
7
|
+
title: Reflective XSS Vulnerability in Ruby on Rails
|
8
|
+
date: 2013-12-03
|
9
|
+
|
10
|
+
description: |
|
11
|
+
There is a vulnerability in the internationalization component of Ruby on
|
12
|
+
Rails. Under certain common configurations an attacker can provide specially
|
13
|
+
crafted input which will execute a reflective XSS attack.
|
14
|
+
|
15
|
+
The root cause of this issue is a vulnerability in the i18n gem which has
|
16
|
+
been assigned the identifier CVE-2013-4492.
|
17
|
+
|
18
|
+
cvss_v2:
|
19
|
+
|
20
|
+
patched_versions:
|
21
|
+
- ~> 3.2.16
|
22
|
+
- ">= 4.0.2"
|
@@ -0,0 +1,24 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2014-0081
|
5
|
+
osvdb: 103439
|
6
|
+
url: http://osvdb.org/show/osvdb/103439
|
7
|
+
title: XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human
|
8
|
+
date: 2014-02-18
|
9
|
+
|
10
|
+
description: |
|
11
|
+
Ruby on Rails contains a flaw that allows a cross-site scripting (XSS) attack.
|
12
|
+
This flaw exists because the actionpack/lib/action_view/helpers/number_helper.rb
|
13
|
+
script does not validate input to the 'number_to_currency', 'number_to_percentage',
|
14
|
+
and 'number_to_human' helpers before returning it to users. This may allow a
|
15
|
+
remote attacker to create a specially crafted request that would execute arbitrary
|
16
|
+
script code in a user's browser session within the trust relationship between
|
17
|
+
their browser and the server.
|
18
|
+
|
19
|
+
cvss_v2:
|
20
|
+
|
21
|
+
patched_versions:
|
22
|
+
- ~> 3.2.17
|
23
|
+
- ~> 4.0.3
|
24
|
+
- ">= 4.1.0.beta2"
|
@@ -0,0 +1,22 @@
|
|
1
|
+
---
|
2
|
+
gem: actionpack
|
3
|
+
framework: rails
|
4
|
+
cve: 2014-0082
|
5
|
+
osvdb: 103440
|
6
|
+
url: http://osvdb.org/show/osvdb/103440
|
7
|
+
title: Denial of Service Vulnerability in Action View when using render :text
|
8
|
+
date: 2014-02-18
|
9
|
+
|
10
|
+
description: |
|
11
|
+
Ruby on Rails contains a flaw in actionpack/lib/action_view/template/text.rb
|
12
|
+
in the text rendering component of Action View that is triggered when
|
13
|
+
handling MIME types that are converted to symbols. This may allow a
|
14
|
+
remote attacker to cause a denial of service.
|
15
|
+
|
16
|
+
cvss_v2:
|
17
|
+
|
18
|
+
unaffected_versions:
|
19
|
+
- ~> 4.0.0
|
20
|
+
|
21
|
+
patched_versions:
|
22
|
+
- ">= 3.2.17"
|
@@ -0,0 +1,23 @@
|
|
1
|
+
---
|
2
|
+
gem: activerecord
|
3
|
+
framework: rails
|
4
|
+
cve: 2014-0080
|
5
|
+
osvdb: 103438
|
6
|
+
url: http://osvdb.org/show/osvdb/103438
|
7
|
+
title: Data Injection Vulnerability in Active Record
|
8
|
+
date: 2014-02-18
|
9
|
+
|
10
|
+
description: |
|
11
|
+
Ruby on Rails contains a flaw in connection_adapters/postgresql/cast.rb
|
12
|
+
in Active Record. This issue may allow a remote attacker to inject data
|
13
|
+
into PostgreSQL array columns via a specially crafted string.
|
14
|
+
|
15
|
+
cvss_v2:
|
16
|
+
|
17
|
+
unaffected_versions:
|
18
|
+
- "< 3.2.0"
|
19
|
+
- ~> 3.2.0
|
20
|
+
|
21
|
+
patched_versions:
|
22
|
+
- ~> 4.0.3
|
23
|
+
- ">= 4.1.0.beta2"
|
@@ -0,0 +1,15 @@
|
|
1
|
+
---
|
2
|
+
gem: Arabic-Prawn
|
3
|
+
osvdb: 104365
|
4
|
+
url: http://osvdb.org/show/osvdb/104365
|
5
|
+
title: Arabic-Prawn Gem for Ruby contains a flaw
|
6
|
+
date: 2014-03-10
|
7
|
+
|
8
|
+
description: |
|
9
|
+
Arabic Prawn Gem for Ruby contains a flaw in the lib/string_utf_support.rb
|
10
|
+
file. The issue is due to the program failing to sanitize user input. This may
|
11
|
+
allow a remote attacker to inject arbitrary commands.
|
12
|
+
|
13
|
+
cvss_v2:
|
14
|
+
|
15
|
+
patched_versions:
|
@@ -8,8 +8,8 @@ date: 2013-10-22
|
|
8
8
|
description: Cocaine Gem for Ruby contains a flaw that is due to the method
|
9
9
|
of variable interpolation used by the program. With a specially crafted
|
10
10
|
object, a context-dependent attacker can execute arbitrary commands.
|
11
|
-
cvss_v2:
|
11
|
+
cvss_v2: 6.8
|
12
12
|
unaffected_versions:
|
13
|
-
-
|
13
|
+
- < 0.4.0
|
14
14
|
patched_versions:
|
15
15
|
- '>= 0.5.3'
|
@@ -8,5 +8,5 @@ date: 2013-03-12
|
|
8
8
|
|
9
9
|
description: Curl Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via the URL. This may allow a context-dependent attacker to potentially execute arbitrary commands by injecting them via a semi-colon (;).
|
10
10
|
|
11
|
-
cvss_v2:
|
11
|
+
cvss_v2: 7.5
|
12
12
|
|
@@ -0,0 +1,11 @@
|
|
1
|
+
---
|
2
|
+
gem: echor
|
3
|
+
osvdb: 102129
|
4
|
+
url: http://osvdb.org/show/osvdb/102129
|
5
|
+
title: Echor Gem for Ruby contains a flaw
|
6
|
+
date: 2014-01-14
|
7
|
+
description: Echor Gem for Ruby contains a flaw in backplane.rb in the perform_request function that is triggered when
|
8
|
+
a semi-colon (;) is injected into a username or password. This may allow a context-dependent attacker to inject
|
9
|
+
arbitrary commands if the gem is used in a rails application.
|
10
|
+
cvss_v2:
|
11
|
+
patched_versions:
|
@@ -0,0 +1,10 @@
|
|
1
|
+
---
|
2
|
+
gem: echor
|
3
|
+
osvdb: 102130
|
4
|
+
url: http://osvdb.org/show/osvdb/102130
|
5
|
+
title: Echor Gem for Ruby contains a flaw
|
6
|
+
date: 2014-01-14
|
7
|
+
description: Echor Gem for Ruby contains a flaw that is due to the program exposing credential information in the
|
8
|
+
system process listing. This may allow a local attacker to gain access to plaintext credential information.
|
9
|
+
cvss_v2:
|
10
|
+
patched_versions:
|
@@ -0,0 +1,14 @@
|
|
1
|
+
---
|
2
|
+
gem: gitlab-grit
|
3
|
+
cve: 2013-4489
|
4
|
+
osvdb: 99370
|
5
|
+
url: http://www.osvdb.org/show/osvdb/99370
|
6
|
+
title: GitLab Grit Gem for Ruby contains a flaw
|
7
|
+
date: 2013-11-04
|
8
|
+
description: GitLab Grit Gem for Ruby contains a flaw in the app/contexts/search_context.rb script.
|
9
|
+
The issue is triggered when input passed via the code search box is not properly sanitized,
|
10
|
+
which allows strings to be evaluated by the Bourne shell. This may allow a remote attacker to
|
11
|
+
execute arbitrary commands.
|
12
|
+
cvss_v2:
|
13
|
+
patched_versions:
|
14
|
+
- '>= 2.6.1'
|
@@ -1,19 +1,14 @@
|
|
1
1
|
---
|
2
2
|
gem: httparty
|
3
|
-
cve: 2013-
|
3
|
+
cve: 2013-1801
|
4
4
|
osvdb: 90741
|
5
5
|
url: http://osvdb.org/show/osvdb/90741
|
6
|
-
title:
|
7
|
-
httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
|
6
|
+
title: httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
|
8
7
|
date: 2013-01-14
|
9
|
-
|
10
8
|
description: |
|
11
9
|
httparty Gem for Ruby contains a flaw that is triggered when a type casting
|
12
10
|
error occurs during the parsing of parameters. This may allow a
|
13
11
|
context-dependent attacker to potentially execute arbitrary code.
|
14
|
-
|
15
|
-
cvss_v2: 9.3
|
16
|
-
|
12
|
+
cvss_v2: 7.5
|
17
13
|
patched_versions:
|
18
14
|
- ">= 0.10.0"
|
19
|
-
|
@@ -0,0 +1,17 @@
|
|
1
|
+
---
|
2
|
+
gem: i18n
|
3
|
+
cve: 2013-4492
|
4
|
+
osvdb: 100528
|
5
|
+
url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
|
6
|
+
title: i18n missing translation error message XSS
|
7
|
+
date: 2013-12-03
|
8
|
+
|
9
|
+
description: |
|
10
|
+
The HTML exception message raised by I18n::MissingTranslation fails
|
11
|
+
to escape the keys.
|
12
|
+
|
13
|
+
cvss_v2: 4.3
|
14
|
+
|
15
|
+
patched_versions:
|
16
|
+
- ~> 0.5.1
|
17
|
+
- '>= 0.6.6'
|
@@ -0,0 +1,12 @@
|
|
1
|
+
---
|
2
|
+
gem: nokogiri
|
3
|
+
cve: 2013-6460
|
4
|
+
osvdb: 101179
|
5
|
+
url: http://www.osvdb.org/show/osvdb/101179
|
6
|
+
title: Nokogiri Gem for JRuby Crafted XML Document Handling Infinite Loop Remote DoS
|
7
|
+
date: 2013-12-14
|
8
|
+
description: Nokogiri Gem for JRuby contains a flaw that may allow a remote denial of service. The issue is triggered when handling a specially crafted XML document, which can result in an infinite loop. This may allow a context-dependent attacker to crash the server.
|
9
|
+
cvss_v2:
|
10
|
+
patched_versions:
|
11
|
+
- ~> 1.5.11
|
12
|
+
- ">= 1.6.1"
|
@@ -0,0 +1,15 @@
|
|
1
|
+
---
|
2
|
+
gem: nokogiri
|
3
|
+
cve: 2013-6461
|
4
|
+
osvdb: 101458
|
5
|
+
url: http://www.osvdb.org/show/osvdb/101458
|
6
|
+
title: Nokogiri Gem for Ruby External Entity (XXE) Expansion Remote DoS
|
7
|
+
date: 2013-12-14
|
8
|
+
description: Nokogiri gem for Ruby contains an flaw that is triggered during the parsing of XML data.
|
9
|
+
The issue is due to an incorrectly configured XML parser accepting XML external entities from
|
10
|
+
an untrusted source. By sending specially crafted XML data, a remote attacker can cause an infinite
|
11
|
+
loop and crash the program.
|
12
|
+
cvss_v2:
|
13
|
+
patched_versions:
|
14
|
+
- ~> 1.5.11
|
15
|
+
- ">= 1.6.1"
|
@@ -0,0 +1,22 @@
|
|
1
|
+
---
|
2
|
+
gem: omniauth-facebook
|
3
|
+
cve: 2013-4562
|
4
|
+
osvdb: 99693
|
5
|
+
url: http://www.osvdb.org/show/osvdb/99693
|
6
|
+
title: omniauth-facebook Gem for Ruby Unspecified CSRF
|
7
|
+
date: 2013-11-12
|
8
|
+
|
9
|
+
description: |
|
10
|
+
omniauth-facebook Gem for Ruby contains a flaw as HTTP requests do not
|
11
|
+
require multiple steps, explicit confirmation, or a unique token when
|
12
|
+
performing certain sensitive actions. By tricking a user into following
|
13
|
+
a specially crafted link, a context-dependent attacker can perform a
|
14
|
+
Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to
|
15
|
+
perform an unspecified action.
|
16
|
+
|
17
|
+
cvss_v2: 6.8
|
18
|
+
|
19
|
+
patched_versions:
|
20
|
+
- ">= 1.5.0"
|
21
|
+
unaffected_versions:
|
22
|
+
- "<= 1.4.0"
|
@@ -0,0 +1,17 @@
|
|
1
|
+
---
|
2
|
+
gem: omniauth-facebook
|
3
|
+
cve: 2013-4593
|
4
|
+
osvdb: 99888
|
5
|
+
url: http://www.osvdb.org/show/osvdb/99888
|
6
|
+
title: omniauth-facebook Gem for Ruby Insecure Access Token Handling Authentication Bypass
|
7
|
+
date: 2013-11-14
|
8
|
+
|
9
|
+
description: |
|
10
|
+
omniauth-facebook Gem for Ruby contains a flaw that is due to the application
|
11
|
+
supporting passing the access token via the URL. This may allow a remote
|
12
|
+
attacker to bypass authentication and authenticate as another user.
|
13
|
+
|
14
|
+
cvss_v2: 6.8
|
15
|
+
|
16
|
+
patched_versions:
|
17
|
+
- ">= 1.5.1"
|
@@ -0,0 +1,13 @@
|
|
1
|
+
---
|
2
|
+
gem: paperclip
|
3
|
+
osvdb: 103151
|
4
|
+
url: http://osvdb.org/show/osvdb/103151
|
5
|
+
title: Paperclip Gem for Ruby contains a flaw
|
6
|
+
date: 2014-01-31
|
7
|
+
description: Paperclip Gem for Ruby contains a flaw that is due to the application failing to properly
|
8
|
+
validate the file extension, instead only validating the Content-Type header during file uploads.
|
9
|
+
This may allow a remote attacker to bypass restrictions on file types for uploaded files by
|
10
|
+
spoofing the content-type.
|
11
|
+
cvss_v2:
|
12
|
+
patched_versions:
|
13
|
+
- ">= 4.0.0"
|
@@ -0,0 +1,12 @@
|
|
1
|
+
---
|
2
|
+
gem: paratrooper-newrelic
|
3
|
+
cve: 2014-1234
|
4
|
+
osvdb: 101839
|
5
|
+
url: http://www.osvdb.org/show/osvdb/101839
|
6
|
+
title: Paratrooper-newrelic Gem for Ruby contains a flaw
|
7
|
+
date: 2014-01-08
|
8
|
+
description: Paratrooper-newrelic Gem for Ruby contains a flaw in /lib/paratrooper-newrelic.rb.
|
9
|
+
The issue is triggered when the script exposes the API key, allowing a local attacker to
|
10
|
+
gain access to it by monitoring the process tree.
|
11
|
+
cvss_v2: 2.1
|
12
|
+
patched_versions:
|
@@ -0,0 +1,13 @@
|
|
1
|
+
---
|
2
|
+
gem: paratrooper-pingdom
|
3
|
+
cve: 2014-1233
|
4
|
+
osvdb: 101847
|
5
|
+
url: http://www.osvdb.org/show/osvdb/101847
|
6
|
+
title: Paratrooper-pingdom Gem for Ruby contains a flaw
|
7
|
+
date: 2013-12-26
|
8
|
+
description: paratrooper-pingdom Gem for Ruby contains a flaw in /lib/paratrooper-pingdom.rb.
|
9
|
+
The issue is triggered when the script exposes API login credentials, allowing a local
|
10
|
+
attacker to gain access to the API key, username, and password for the API login by
|
11
|
+
monitoring the process tree.
|
12
|
+
cvss_v2: 2.1
|
13
|
+
patched_versions:
|
@@ -0,0 +1,20 @@
|
|
1
|
+
---
|
2
|
+
gem: rbovirt
|
3
|
+
cve: 2014-0036
|
4
|
+
osvdb: 104080
|
5
|
+
url: http://osvdb.org/show/osvdb/104080
|
6
|
+
title: rbovirt Gem for Ruby contains a flaw
|
7
|
+
date: 2014-03-05
|
8
|
+
|
9
|
+
description: |
|
10
|
+
rbovirt Gem for Ruby contains a flaw related to certificate validation.
|
11
|
+
The issue is due to the program failing to validate SSL certificates. This may
|
12
|
+
allow an attacker with access to network traffic (e.g. MiTM, DNS cache
|
13
|
+
poisoning) to spoof the SSL server via an arbitrary certificate that appears
|
14
|
+
valid. Such an attack would allow for the interception of sensitive traffic,
|
15
|
+
and potentially allow for the injection of content into the SSL stream.
|
16
|
+
|
17
|
+
cvss_v2:
|
18
|
+
|
19
|
+
patched_versions:
|
20
|
+
- '>= 0.0.24'
|