Class: Dawn::Kb::CVE_2011_2197
- Inherits:
-
Object
- Object
- Dawn::Kb::CVE_2011_2197
- Includes:
- DependencyCheck
- Defined in:
- lib/dawn/kb/cve_2011_2197.rb
Overview
Automatically created with rake on 2013-05-30
Constant Summary
Constants included from BasicCheck
Instance Attribute Summary
Attributes included from DependencyCheck
#aux_mitigation_gem, #dependencies, #not_affected, #safe_dependencies, #save_major, #save_minor
Attributes included from BasicCheck
#applies, #aux_links, #check_family, #cve, #cvss, #cwe, #debug, #evidences, #fixes_version, #kind, #message, #mitigated, #name, #osvdb, #owasp, #priority, #release_date, #remediation, #ruby_version, #ruby_vulnerable_versions, #severity, #status, #target_version, #title
Instance Method Summary collapse
-
#initialize ⇒ CVE_2011_2197
constructor
A new instance of CVE_2011_2197.
Methods included from DependencyCheck
Methods included from BasicCheck
#applies_to?, #cve_link, #cvss_score, families, #family, #family=, #lint, #mitigated?, #nvd_link, #osvdb_link, #rubysec_advisories_link
Methods included from Utils
#__debug_me_and_return, #debug_me, #debug_me_and_return_false, #debug_me_and_return_true
Constructor Details
#initialize ⇒ CVE_2011_2197
Returns a new instance of CVE_2011_2197.
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 |
# File 'lib/dawn/kb/cve_2011_2197.rb', line 7 def initialize ="The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method." super({ :name=>"CVE-2011-2197", :cvss=>"AV:N/AC:M/Au:N/C:N/I:P/A:N", :release_date => Date.new(2011, 6, 30), :cwe=>"79", :owasp=>"A3", :applies=>["rails"], :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK, :message=>, :mitigation=>"Please upgrade rails version at least to 2.3.12, 3.0.8, 3.1.0. As a general rule, using the latest stable rails version is recommended.", :aux_links=>["http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications"] }) self.safe_dependencies = [{:name=>"rails", :version=>['2.3.12', '3.0.8', '3.1.0']}] end |