data/ruby-advisory-db/CONTRIBUTING.md in bundler-audit-0.5.0 vs data/ruby-advisory-db/CONTRIBUTING.md in bundler-audit-0.6.0

- old
+ new

@@ -8,49 +8,62 @@ ``` bundle install bundle exec rspec ``` -* Follow the schema. Here is a sample advisory: +* Follow the schema. Here is an example advisory: ```yaml --- - gem: activerecord - framework: rails - cve: 2014-3514 - url: https://groups.google.com/forum/#!msg/rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ - title: Data Injection Vulnerability in Active Record - date: 2014-08-18 + gem: examplegem + cve: 2013-0156 + url: https://github.com/rubysec/ruby-advisory-db/issues/123456 + title: | + Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing + Remote Code Execution - description: >- - The create_with functionality in Active Record was implemented - incorrectly and completely bypasses the strong parameters - protection. Applications which pass user-controlled values to - create_with could allow attackers to set arbitrary attributes on - models. - - cvss_v2: 8.7 + description: | + Ruby on Rails contains a flaw in params_parser.rb of the Action Pack. + The issue is triggered when a type casting error occurs during the parsing + of parameters. This may allow a remote attacker to potentially execute + arbitrary code. - unaffected_versions: - - "< 4.0.0" + cvss_v2: 10.0 patched_versions: - - ~> 4.0.9 - - ">= 4.1.5" + - ~> 2.3.15 + - ~> 3.0.19 + - ~> 3.1.10 + - ">= 3.2.11" + unaffected_versions: + - ~> 2.4.3 + + related: + cve: + - 2013-1234567 + - 2013-1234568 + url: + - https://github.com/rubysec/ruby-advisory-db/issues/123457 + ``` ### Schema * `gem` \[String\]: Name of the affected gem. * `framework` \[String\] (optional): Name of framework gem belongs to. * `platform` \[String\] (optional): If this vulnerability is platform-specific, name of platform this vulnerability affects (e.g. JRuby) * `cve` \[String\]: CVE id. -* `osvdb` \[Fixnum\]: OSVDB id. +* `osvdb` \[Integer\]: OSVDB id. * `url` \[String\]: The URL to the full advisory. * `title` \[String\]: The title of the advisory. * `date` \[Date\]: Disclosure date of the advisory. * `description` \[String\]: Multi-paragraph description of the vulnerability. * `cvss_v2` \[Float\]: The [CVSSv2] score for the vulnerability. +* `cvss_v3` \[Float\]: The [CVSSv3] score for the vulnerability. * `unaffected_versions` \[Array\<String\>\] (optional): The version requirements for the unaffected versions of the Ruby library. * `patched_versions` \[Array\<String\>\]: The version requirements for the patched versions of the Ruby library. +* `related` \[Hash\<Array\<String\>\>\]: Sometimes an advisory references many urls and cves. Supported keys: `cve` and `url` + +[CVSSv2]: https://www.first.org/cvss/v2/guide +[CVSSv3]: https://www.first.org/cvss/user-guide