Sha256: f55f4f91865a711465b55fe0938295d832e4957a81657757b304603753d95e04

Contents?: true

Size: 1.45 KB

Versions: 4

Compression:

Stored size: 1.45 KB

Contents

require 'railroader/checks/base_check'

class Railroader::CheckJSONEncoding < Railroader::BaseCheck
  Railroader::Checks.add self

  @description = "Checks for missing JSON encoding (CVE-2015-3226)"

  def run_check
    if (version_between? "4.1.0", "4.1.10" or version_between? "4.2.0", "4.2.1") and not has_workaround?
      message = "Rails #{rails_version} does not encode JSON keys (CVE-2015-3226). Upgrade to Rails version "

      if version_between? "4.1.0", "4.1.10"
        message << "4.1.11"
      else
        message << "4.2.2"
      end

      if tracker.find_call(:methods => [:to_json, :encode]).any?
        confidence = :high
      else
        confidence = :medium
      end

      warn :warning_type => "Cross-Site Scripting",
        :warning_code => :CVE_2015_3226,
        :message => message,
        :confidence => confidence,
        :gem_info => gemfile_or_environment,
        :link_path => "https://groups.google.com/d/msg/rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ"
    end
  end

  def has_workaround?
    workaround = s(:module, :ActiveSupport,
                   s(:module, :JSON,
                     s(:module, :Encoding,
                       s(:call, nil, :private),
                       s(:class, :EscapedString, nil,
                         s(:defn, :to_s,
                           s(:args),
                           s(:self))))))

    tracker.initializers.any? do |_name, initializer|
      initializer == workaround
    end
  end
end

Version data entries

4 entries across 4 versions & 1 rubygems

Version Path
railroader-4.3.8 lib/railroader/checks/check_json_encoding.rb
railroader-4.3.7 lib/railroader/checks/check_json_encoding.rb
railroader-4.3.5 lib/railroader/checks/check_json_encoding.rb
railroader-4.3.4 lib/railroader/checks/check_json_encoding.rb