Sha256: a107722efbe293d88b329106c613c950b932404fbc0b2d830c5d636d2d8ad60c

Contents?: true

Size: 634 Bytes

Versions: 7

Compression:

Stored size: 634 Bytes

Contents

require 'brakeman/checks/base_check'

#Check for versions with vulnerable html escape method
#http://groups.google.com/group/rubyonrails-security/browse_thread/thread/56bffb5923ab1195
class Brakeman::CheckEscapeFunction < Brakeman::BaseCheck
  Brakeman::Checks.add self

  def run_check
    if version_between?('2.0.0', '2.3.13') and RUBY_VERSION < '1.9.0' 

      warn :warning_type => 'Cross Site Scripting',
        :message => 'Versions before 2.3.14 have a vulnerability in escape method when used with Ruby 1.8: CVE-2011-2931',
        :confidence => CONFIDENCE[:high],
        :file => gemfile_or_environment
    end
  end
end

Version data entries

7 entries across 7 versions & 1 rubygems

Version Path
brakeman-1.2.2 lib/brakeman/checks/check_escape_function.rb
brakeman-1.2.1 lib/brakeman/checks/check_escape_function.rb
brakeman-1.2.0 lib/brakeman/checks/check_escape_function.rb
brakeman-1.1.0 lib/brakeman/checks/check_escape_function.rb
brakeman-1.1.pre lib/brakeman/checks/check_escape_function.rb
brakeman-1.0.0 lib/brakeman/checks/check_escape_function.rb
brakeman-1.0.rc1 lib/brakeman/checks/check_escape_function.rb