Sha256: 5a85b33a5199bc94f39acbf27a9ef57b77a7883a87db52d0207c312b69b8978b
Contents?: true
Size: 1.09 KB
Versions: 19
Compression:
Stored size: 1.09 KB
Contents
require 'brakeman/checks/base_check' class Brakeman::CheckJRubyXML < Brakeman::BaseCheck Brakeman::Checks.add self @description = "Checks for versions with JRuby XML parsing backend" def run_check return unless RUBY_PLATFORM == "java" fix_version = case when version_between?('3.0.0', '3.0.99') '3.2.13' when version_between?('3.1.0', '3.1.11') '3.1.12' when version_between?('3.2.0', '3.2.12') '3.2.13' else return end #Check for workaround tracker.check_initializers(:"ActiveSupport::XmlMini", :backend=).each do |result| arg = result.call.first_arg return if string? arg and arg.value == "REXML" end warn :warning_type => "File Access", :warning_code => :CVE_2013_1856, :message => msg(msg_version(rails_version), " with JRuby has a vulnerability in XML parser. Upgrade to ", msg_version(fix_version), " or patch"), :confidence => :high, :gem_info => gemfile_or_environment, :link => "https://groups.google.com/d/msg/rubyonrails-security/KZwsQbYsOiI/5kUV7dSCJGwJ" end end
Version data entries
19 entries across 19 versions & 4 rubygems