Sha256: 0482633e95d2661b9f3d06ebee4b910aa9f0bd05edbfd42fa21dea2568616e16
Contents?: true
Size: 1.6 KB
Versions: 9
Compression:
Stored size: 1.6 KB
Contents
module Codesake module Dawn module Kb module OwaspRorCheatSheet class CommandInjection include PatternMatchCheck def initialize message = "Ruby offers a function called \"eval\" which will dynamically build new Ruby code based on Strings. It also has a number of ways to call system commands. While the power of these commands is quite useful, extreme care should be taken when using them in a Rails based application. Usually, its just a bad idea. If need be, a whitelist of possible values should be used and any input should be validated as thoroughly as possible. The Ruby Security Reviewer's Guide has a section on injection and there are a number of OWASP references for it, starting at the top: Command Injection." super({ :name=>"Owasp Ror CheatSheet: Command Injection", :kind=>Codesake::Dawn::KnowledgeBase::PATTERN_MATCH_CHECK, :applies=>["rails"], :glob=>"*.rb", :aux_links=>["https://www.owasp.org/index.php/Ruby_on_Rails_Cheatsheet"], :message=>message, :attack_pattern => ["eval", "System", "\`", "Kernel.exec"], :avoid_comments => true, :check_family=>:owasp_ror_cheatsheet, :severity=>:info, :mitigation=>"Please validate the code you pass as argument to eval, System, Kernel.exec and friends. If you generate your command line with user controlled values, can lead to an arbitrary code execution." }) # @debug = true end end end end end end
Version data entries
9 entries across 9 versions & 2 rubygems