Sha256: 9a90fb9c9520486d702038ced0cf9940e96ea05c43ec2d53291366e7fee74fdf
Contents?: true
Size: 1.57 KB
Versions: 6
Compression:
Stored size: 1.57 KB
Contents
module Dawn module Kb module OwaspRorCheatSheet class CommandInjection include PatternMatchCheck def initialize message = "Ruby offers a function called \"eval\" which will dynamically build new Ruby code based on Strings. It also has a number of ways to call system commands. While the power of these commands is quite useful, extreme care should be taken when using them in a Rails based application. Usually, its just a bad idea. If need be, a whitelist of possible values should be used and any input should be validated as thoroughly as possible. The Ruby Security Reviewer's Guide has a section on injection and there are a number of OWASP references for it, starting at the top: Command Injection." super({ :name=>"Owasp Ror CheatSheet: Command Injection", :kind=>Dawn::KnowledgeBase::PATTERN_MATCH_CHECK, :applies=>["rails"], :glob=>"*.rb", :aux_links=>["https://www.owasp.org/index.php/Ruby_on_Rails_Cheatsheet"], :message=>message, :attack_pattern => ["eval", "System", "\`", "Kernel.exec"], :avoid_comments => true, :check_family=>:owasp_ror_cheatsheet, :severity=>:info, :mitigation=>"Please validate the code you pass as argument to eval, System, Kernel.exec and friends. If you generate your command line with user controlled values, can lead to an arbitrary code execution." }) # @debug = true end end end end end
Version data entries
6 entries across 6 versions & 1 rubygems