require 'brakeman/checks/base_check' #Check for uses of quote_table_name in Rails versions before 2.3.13 and 3.0.10 #http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6a1e473744bc389b class Brakeman::CheckQuoteTableName < Brakeman::BaseCheck Brakeman::Checks.add self @description = "Checks for quote_table_name vulnerability in versions before 2.3.14 and 3.0.10" def run_check if (version_between?('2.0.0', '2.3.13') or version_between?('3.0.0', '3.0.9')) if uses_quote_table_name? confidence = CONFIDENCE[:high] else confidence = CONFIDENCE[:med] end if rails_version =~ /^3/ message = "Versions before 3.0.10 have a vulnerability in quote_table_name: CVE-2011-2930" else message = "Versions before 2.3.14 have a vulnerability in quote_table_name: CVE-2011-2930" end warn :warning_type => "SQL Injection", :warning_code => :CVE_2011_2930, :message => message, :confidence => confidence, :gem_info => gemfile_or_environment, :link_path => "https://groups.google.com/d/topic/rubyonrails-security/ah5HN0S8OJs/discussion" end end def uses_quote_table_name? Brakeman.debug "Finding calls to quote_table_name()" not tracker.find_call(:target => false, :method => :quote_table_name).empty? end end