Sha256: eaba93dba3f3154c9a26dbd7aa9ded8efdddbd33d45c3dd1cef70b9ff29615c1
Contents?: true
Size: 1.04 KB
Versions: 12
Compression:
Stored size: 1.04 KB
Contents
require 'brakeman/checks/base_check' class Brakeman::CheckHeaderDoS < Brakeman::BaseCheck Brakeman::Checks.add self @description = "Checks for header DoS (CVE-2013-6414)" def run_check if (version_between? "3.0.0", "3.2.15" or version_between? "4.0.0", "4.0.1") and not has_workaround? message = "Rails #{tracker.config[:rails_version]} has a denial of service vulnerability (CVE-2013-6414). Upgrade to Rails version " if version_between? "3.0.0", "3.2.15" message << "3.2.16" else message << "4.0.2" end warn :warning_type => "Denial of Service", :warning_code => :CVE_2013_6414, :message => message, :confidence => CONFIDENCE[:med], :gem_info => gemfile_or_environment, :link_path => "https://groups.google.com/d/msg/ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ" end end def has_workaround? tracker.check_initializers(:ActiveSupport, :on_load).any? and tracker.check_initializers(:"ActionView::LookupContext::DetailsKey", :class_eval).any? end end
Version data entries
12 entries across 12 versions & 2 rubygems