Sha256: ade8432701fa6c5b4381bd2cbad07a41af26214dce7185343cd9cd919c587232
Contents?: true
Size: 1.46 KB
Versions: 63
Compression:
Stored size: 1.46 KB
Contents
require 'brakeman/checks/base_check' class Brakeman::CheckJSONEncoding < Brakeman::BaseCheck Brakeman::Checks.add self @description = "Checks for missing JSON encoding (CVE-2015-3226)" def run_check if (version_between? "4.1.0", "4.1.10" or version_between? "4.2.0", "4.2.1") and not has_workaround? message = "Rails #{rails_version} does not encode JSON keys (CVE-2015-3226). Upgrade to Rails version " if version_between? "4.1.0", "4.1.10" message << "4.1.11" else message << "4.2.2" end if tracker.find_call(:methods => [:to_json, :encode]).any? confidence = CONFIDENCE[:high] else confidence = CONFIDENCE[:med] end warn :warning_type => "Cross Site Scripting", :warning_code => :CVE_2015_3226, :message => message, :confidence => confidence, :gem_info => gemfile_or_environment, :link_path => "https://groups.google.com/d/msg/rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ" end end def has_workaround? workaround = s(:module, :ActiveSupport, s(:module, :JSON, s(:module, :Encoding, s(:call, nil, :private), s(:class, :EscapedString, nil, s(:defn, :to_s, s(:args), s(:self)))))) tracker.initializers.any? do |name, initializer| initializer == workaround end end end
Version data entries
63 entries across 63 versions & 3 rubygems