Sha256: ea5a7fae9c22575cf0f2bb569e0a7c0fdfc3341e514609fdd79ca67f91ac5349

Contents?: true

Size: 1.49 KB

Versions: 4

Compression:

Stored size: 1.49 KB

Contents

require 'brakeman/checks/base_check'

class Brakeman::CheckI18nXSS < Brakeman::BaseCheck
  Brakeman::Checks.add self

  @description = "Checks for i18n XSS (CVE-2013-4491)"

  def run_check
    if (version_between? "3.0.6", "3.2.15" or version_between? "4.0.0", "4.0.1") and not has_workaround?
      message = "Rails #{tracker.config[:rails_version]} has an XSS vulnerability in i18n (CVE-2013-4491). Upgrade to Rails version "

      i18n_gem = tracker.config[:gems][:i18n]

      if version_between? "3.0.6", "3.1.99" and version_before i18n_gem, "0.5.1"
        message << "3.2.16 or i18n 0.5.1"
      elsif version_between? "3.2.0", "4.0.1" and version_before i18n_gem, "0.6.6"
        message << "4.0.2 or i18n 0.6.6"
      else
        return
      end

      warn :warning_type => "Cross Site Scripting",
        :warning_code => :CVE_2013_4491,
        :message => message,
        :confidence => CONFIDENCE[:med],
        :file => gemfile_or_environment,
        :link_path => "https://groups.google.com/d/msg/ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ"
    end
  end

  def version_before gem_version, target
    return true unless gem_version
    gem_version.split('.').map(&:to_i).zip(target.split('.').map(&:to_i)).each do |gv, t|
      if gv < t
        return true
      elsif gv > t
        return false
      end
    end

    false
  end

  def has_workaround?
    tracker.check_initializers(:I18n, :const_defined?).any? do |match|
      match.last.first_arg == s(:lit, :MissingTranslation)
    end
  end
end

Version data entries

4 entries across 4 versions & 2 rubygems

Version Path
brakeman-2.6.3 lib/brakeman/checks/check_i18n_xss.rb
brakeman-min-2.6.3 lib/brakeman/checks/check_i18n_xss.rb
brakeman-min-2.6.2 lib/brakeman/checks/check_i18n_xss.rb
brakeman-2.6.2 lib/brakeman/checks/check_i18n_xss.rb