|
5 | 5 | ],
|
6 | 6 | "check_name": "Insecure Dependency",
|
7 | 7 | "content": {
|
8 |
| - "body": "**Advisory**: CVE-2015-7581\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE\n\n**Solution**: upgrade to >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14" |
| 8 | + "body": "**Advisory**: CVE-2016-0751\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1" |
9 | 9 | },
|
10 |
| - "description": "Object leak vulnerability for wildcard controller routes in Action Pack", |
11 |
| - "fingerprint": "06ae795b91e09069846af543d755b9e1", |
| 10 | + "description": "Possible Object Leak and Denial of Service attack in Action Pack", |
| 11 | + "fingerprint": "fb0889d061f06c4203ed27b43aca68b2", |
12 | 12 | "location": {
|
13 | 13 | "lines": {
|
14 | 14 | "begin": 18,
|
|
26 | 26 | ],
|
27 | 27 | "check_name": "Insecure Dependency",
|
28 | 28 | "content": {
|
29 |
| - "body": "**Advisory**: CVE-2015-7576\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/ANv0HDHEC3k\n\n**Solution**: upgrade to ~> 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1" |
| 29 | + "body": "**Advisory**: CVE-2016-2098\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/ly-IH-fxr_Q\n\n**Solution**: upgrade to ~> 3.2.22.2, >= 4.2.5.2, ~> 4.2.5, >= 4.1.14.2, ~> 4.1.14" |
30 | 30 | },
|
31 |
| - "description": "Timing attack vulnerability in basic authentication in Action Controller.", |
32 |
| - "fingerprint": "98b8ca0112bff7bf79c1a85a829cf948", |
| 31 | + "description": "Possible remote code execution vulnerability in Action Pack", |
| 32 | + "fingerprint": "464176078b0d3514fdf527afe2f93315", |
33 | 33 | "location": {
|
34 | 34 | "lines": {
|
35 | 35 | "begin": 18,
|
|
47 | 47 | ],
|
48 | 48 | "check_name": "Insecure Dependency",
|
49 | 49 | "content": {
|
50 |
| - "body": "**Advisory**: CVE-2016-2098\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/ly-IH-fxr_Q\n\n**Solution**: upgrade to ~> 3.2.22.2, >= 4.2.5.2, ~> 4.2.5, >= 4.1.14.2, ~> 4.1.14" |
| 50 | + "body": "**Advisory**: CVE-2015-7576\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/ANv0HDHEC3k\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1" |
51 | 51 | },
|
52 |
| - "description": "Possible remote code execution vulnerability in Action Pack", |
53 |
| - "fingerprint": "464176078b0d3514fdf527afe2f93315", |
| 52 | + "description": "Timing attack vulnerability in basic authentication in Action Controller.", |
| 53 | + "fingerprint": "98b8ca0112bff7bf79c1a85a829cf948", |
54 | 54 | "location": {
|
55 | 55 | "lines": {
|
56 | 56 | "begin": 18,
|
|
68 | 68 | ],
|
69 | 69 | "check_name": "Insecure Dependency",
|
70 | 70 | "content": {
|
71 |
| - "body": "**Advisory**: CVE-2016-0751\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc\n\n**Solution**: upgrade to ~> 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1" |
| 71 | + "body": "**Advisory**: CVE-2015-7581\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE\n\n**Solution**: upgrade to >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14" |
72 | 72 | },
|
73 |
| - "description": "Possible Object Leak and Denial of Service attack in Action Pack", |
74 |
| - "fingerprint": "fb0889d061f06c4203ed27b43aca68b2", |
| 73 | + "description": "Object leak vulnerability for wildcard controller routes in Action Pack", |
| 74 | + "fingerprint": "06ae795b91e09069846af543d755b9e1", |
75 | 75 | "location": {
|
76 | 76 | "lines": {
|
77 | 77 | "begin": 18,
|
|
89 | 89 | ],
|
90 | 90 | "check_name": "Insecure Dependency",
|
91 | 91 | "content": {
|
92 |
| - "body": "**Advisory**: CVE-2016-0752\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00\n\n**Solution**: upgrade to ~> 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14" |
| 92 | + "body": "**Advisory**: CVE-2016-6316\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk\n\n**Solution**: upgrade to ~> 4.2.7.1, ~> 4.2.8, >= 5.0.0.1" |
| 93 | + }, |
| 94 | + "description": "Possible XSS Vulnerability in Action View", |
| 95 | + "fingerprint": "f49fdfa41c42d6b18c17913156307c51", |
| 96 | + "location": { |
| 97 | + "lines": { |
| 98 | + "begin": 25, |
| 99 | + "end": 25 |
| 100 | + }, |
| 101 | + "path": "Gemfile.lock" |
| 102 | + }, |
| 103 | + "remediation_points": 500000, |
| 104 | + "severity": "normal", |
| 105 | + "type": "Issue" |
| 106 | + }, |
| 107 | + { |
| 108 | + "categories": [ |
| 109 | + "Security" |
| 110 | + ], |
| 111 | + "check_name": "Insecure Dependency", |
| 112 | + "content": { |
| 113 | + "body": "**Advisory**: CVE-2016-0752\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14" |
93 | 114 | },
|
94 | 115 | "description": "Possible Information Leak Vulnerability in Action View",
|
95 | 116 | "fingerprint": "f26c202060c497fd32f90c538c543445",
|
|
110 | 131 | ],
|
111 | 132 | "check_name": "Insecure Dependency",
|
112 | 133 | "content": {
|
113 |
| - "body": "**Advisory**: CVE-2016-0753\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ\n\n**Solution**: upgrade to ~> 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14" |
| 134 | + "body": "**Advisory**: CVE-2016-0753\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14" |
114 | 135 | },
|
115 | 136 | "description": "Possible Input Validation Circumvention in Active Model",
|
116 | 137 | "fingerprint": "723fd12f6da25240ffbf2f3312b8e33d",
|
|
131 | 152 | ],
|
132 | 153 | "check_name": "Insecure Dependency",
|
133 | 154 | "content": {
|
134 |
| - "body": "**Advisory**: CVE-2015-7577\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g\n\n**Solution**: upgrade to ~> 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1" |
| 155 | + "body": "**Advisory**: CVE-2015-7577\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1" |
135 | 156 | },
|
136 | 157 | "description": "Nested attributes rejection proc bypass in Active Record",
|
137 | 158 | "fingerprint": "2441a69a4af613e9235af4024ff21b30",
|
|
146 | 167 | "severity": "normal",
|
147 | 168 | "type": "Issue"
|
148 | 169 | },
|
| 170 | + { |
| 171 | + "categories": [ |
| 172 | + "Security" |
| 173 | + ], |
| 174 | + "check_name": "Insecure Dependency", |
| 175 | + "content": { |
| 176 | + "body": "**Advisory**: CVE-2016-6317\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/rgO20zYW33s\n\n**Solution**: upgrade to >= 4.2.7.1" |
| 177 | + }, |
| 178 | + "description": "Unsafe Query Generation Risk in Active Record", |
| 179 | + "fingerprint": "1e32b91522fc8bdf4def84929a11d4b6", |
| 180 | + "location": { |
| 181 | + "lines": { |
| 182 | + "begin": 37, |
| 183 | + "end": 37 |
| 184 | + }, |
| 185 | + "path": "Gemfile.lock" |
| 186 | + }, |
| 187 | + "remediation_points": 500000, |
| 188 | + "severity": "normal", |
| 189 | + "type": "Issue" |
| 190 | + }, |
149 | 191 | {
|
150 | 192 | "categories": [
|
151 | 193 | "Security"
|
|
188 | 230 | "severity": "normal",
|
189 | 231 | "type": "Issue"
|
190 | 232 | },
|
| 233 | + { |
| 234 | + "categories": [ |
| 235 | + "Security" |
| 236 | + ], |
| 237 | + "check_name": "Insecure Dependency", |
| 238 | + "content": { |
| 239 | + "body": "**Advisory**: CVE-2015-8806\n\n**URL**: https://github.com/sparklemotion/nokogiri/issues/1473\n\n**Solution**: upgrade to >= 1.6.8" |
| 240 | + }, |
| 241 | + "description": "Denial of service or RCE from libxml2 and libxslt", |
| 242 | + "fingerprint": "2675b3a139ad320ff6843f7dc5b9937e", |
| 243 | + "location": { |
| 244 | + "lines": { |
| 245 | + "begin": 74, |
| 246 | + "end": 74 |
| 247 | + }, |
| 248 | + "path": "Gemfile.lock" |
| 249 | + }, |
| 250 | + "remediation_points": 500000, |
| 251 | + "severity": "normal", |
| 252 | + "type": "Issue" |
| 253 | + }, |
191 | 254 | {
|
192 | 255 | "categories": [
|
193 | 256 | "Security"
|
|
0 commit comments