Class: Dawn::Kb::CVE_2013_6461
- Inherits:
-
Object
- Object
- Dawn::Kb::CVE_2013_6461
- Includes:
- ComboCheck
- Defined in:
- lib/dawn/kb/cve_2013_6461.rb
Constant Summary
Constants included from BasicCheck
Instance Attribute Summary
Attributes included from ComboCheck
#checks, #options, #vulnerable_checks
Attributes included from BasicCheck
#applies, #aux_links, #check_family, #cve, #cvss, #cwe, #debug, #evidences, #fixes_version, #kind, #message, #mitigated, #name, #osvdb, #owasp, #priority, #release_date, #remediation, #ruby_version, #ruby_vulnerable_versions, #severity, #status, #target_version, #title
Instance Method Summary collapse
-
#initialize ⇒ CVE_2013_6461
constructor
A new instance of CVE_2013_6461.
Methods included from ComboCheck
#dump_status, find_vulnerable_checks_by_class, #vuln?
Methods included from BasicCheck
#applies_to?, #cve_link, #cvss_score, families, #family, #family=, #lint, #mitigated?, #nvd_link, #osvdb_link, #rubysec_advisories_link
Methods included from Utils
#__debug_me_and_return, #debug_me, #debug_me_and_return_false, #debug_me_and_return_true
Constructor Details
#initialize ⇒ CVE_2013_6461
Returns a new instance of CVE_2013_6461.
33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 |
# File 'lib/dawn/kb/cve_2013_6461.rb', line 33 def initialize = "There is an entity expansion vulnerability in Nokogiri when using JRuby. Nokogiri users on JRuby using the native Java extension. Attackers can send XML documents with carefully crafted entity expansion strings which can cause the server to run out of memory and crash." super({ :name=>"CVE-2013-6461", :cvss=>"AV:N/AC:M/Au:N/C:N/I:N/A:P", :release_date => Date.new(2013, 12, 15), :cwe=>"", :owasp=>"A9", :applies=>["rails", "sinatra", "padrino"], :kind=>Dawn::KnowledgeBase::COMBO_CHECK, :message=>, :mitigation=>"Please upgrade nokogiri gem to a newer version", :aux_links=>["https://groups.google.com/forum/#!topic/ruby-security-ann/DeJpjTAg1FA"], :checks=>[CVE_2013_6461_a.new, CVE_2013_6461_b.new] }) end |