Class: Dawn::Kb::CVE_2013_0155
- Inherits:
-
Object
- Object
- Dawn::Kb::CVE_2013_0155
- Includes:
- DependencyCheck
- Defined in:
- lib/dawn/kb/cve_2013_0155.rb
Overview
Automatically created with rake on 2013-05-10
Constant Summary
Constants included from BasicCheck
Instance Attribute Summary
Attributes included from DependencyCheck
#aux_mitigation_gem, #dependencies, #not_affected, #safe_dependencies, #save_major, #save_minor
Attributes included from BasicCheck
#applies, #aux_links, #check_family, #cve, #cvss, #cwe, #debug, #evidences, #fixes_version, #kind, #message, #mitigated, #name, #osvdb, #owasp, #priority, #release_date, #remediation, #ruby_version, #ruby_vulnerable_versions, #severity, #status, #target_version, #title
Instance Method Summary collapse
-
#initialize ⇒ CVE_2013_0155
constructor
A new instance of CVE_2013_0155.
Methods included from DependencyCheck
Methods included from BasicCheck
#applies_to?, #cve_link, #cvss_score, families, #family, #family=, #lint, #mitigated?, #nvd_link, #osvdb_link, #rubysec_advisories_link
Methods included from Utils
#__debug_me_and_return, #debug_me, #debug_me_and_return_false, #debug_me_and_return_true
Constructor Details
#initialize ⇒ CVE_2013_0155
Returns a new instance of CVE_2013_0155.
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 |
# File 'lib/dawn/kb/cve_2013_0155.rb', line 7 def initialize = "Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain \"[nil]\" values, a related issue to CVE-2012-2660 and CVE-2012-2694." super({ :name=>"CVE-2013-0155", :cvss=>"AV:N/AC:L/Au:N/C:P/I:P/A:N", :release_date => Date.new(2013, 1, 13), :cwe=>"", :owasp=>"A9", :applies=>["rails"], :kind=>Dawn::KnowledgeBase::DEPENDENCY_CHECK, :message=>, :mitigation=>"Please upgrade rails version at least to 3.0.19, 3.1.10 and 3.2.11. As a general rule, using the latest stable rails version is recommended.", :aux_links=>["https://groups.google.com/d/topic/rubyonrails-security/c7jT-EeN9eI/discussion"] }) self.safe_dependencies = [{:name=>"rails", :version=>['3.0.19', '3.1.10', '3.2.11']}] end |