lib/brakeman/checks/check_json_parsing.rb in brakeman-min-3.7.2 vs lib/brakeman/checks/check_json_parsing.rb in brakeman-min-4.0.0

- old
+ new

@@ -28,11 +28,11 @@ end warn :warning_type => "Remote Code Execution", :warning_code => :CVE_2013_0333, :message => message, - :confidence => CONFIDENCE[:high], + :confidence => :high, :gem_info => gem_info, :link_path => "https://groups.google.com/d/topic/rubyonrails-security/1h2DR63ViGo/discussion" end end @@ -69,27 +69,27 @@ return if version >= "1.7.7" or (version >= "1.6.8" and version < "1.7.0") or (version >= "1.5.5" and version < "1.6.0") warning_type = "Denial of Service" - confidence = CONFIDENCE[:med] + confidence = :medium message = "#{name} gem version #{version} has a symbol creation vulnerablity: upgrade to " if version >= "1.7.0" - confidence = CONFIDENCE[:high] + confidence = :high warning_type = "Remote Code Execution" message = "#{name} gem version #{version} has a remote code vulnerablity: upgrade to 1.7.7" elsif version >= "1.6.0" message << "1.6.8" elsif version >= "1.5.0" message << "1.5.5" else - confidence = CONFIDENCE[:low] + confidence = :weak message << "1.5.5" end - if confidence == CONFIDENCE[:med] and uses_json_parse? - confidence = CONFIDENCE[:high] + if confidence == :medium and uses_json_parse? + confidence = :high end warn :warning_type => warning_type, :warning_code => :CVE_2013_0269, :message => message,