diff --git a/.github/FUNDING.yml b/.github/FUNDING.yml
new file mode 100644
index 00000000..261abaae
--- /dev/null
+++ b/.github/FUNDING.yml
@@ -0,0 +1,3 @@
+github:
+ - reedloden
+ - postmodern
diff --git a/.github/workflows/advisories.yml b/.github/workflows/advisories.yml
new file mode 100644
index 00000000..f7c90125
--- /dev/null
+++ b/.github/workflows/advisories.yml
@@ -0,0 +1,38 @@
+name: Update advisories
+
+on:
+ repository_dispatch:
+ types: [ changed ]
+
+jobs:
+ update-advisories:
+ runs-on: ubuntu-latest
+ steps:
+ - uses: actions/checkout@v2
+ - name: Checkout ruby-advisory-db
+ uses: actions/checkout@v2
+ with:
+ repository: rubysec/ruby-advisory-db
+ path: _advisories
+ - name: Set up Ruby
+ uses: ruby/setup-ruby@v1
+ with:
+ ruby-version: ruby
+ - name: Install dependencies
+ run: bundle install --jobs 4 --retry 3
+ - name: Generate advisories
+ run: bundle exec rake advisories:generate
+ - name: Get latest advisory commit
+ id: git-commit
+ working-directory: _advisories
+ run: |
+ echo "::set-output name=author::$(git show -s --format='%an <%ae>')"
+ echo "::set-output name=hash::$(git rev-parse --short HEAD)"
+ - name: Commit any updates
+ uses: stefanzweifel/git-auto-commit-action@v4
+ with:
+ commit_message: "Updated advisory posts against rubysec/ruby-advisory-db@${{ steps.git-commit.outputs.hash }}"
+ file_pattern: advisories/_posts/*.md
+ commit_user_name: RubySec CI
+ commit_user_email: ci@rubysec.com
+ commit_author: ${{ steps.git-commit.outputs.author }}
diff --git a/404.html b/404.html
new file mode 100644
index 00000000..4e02b238
--- /dev/null
+++ b/404.html
@@ -0,0 +1,17 @@
+---
+layout: page
+title: Whoops, I couldn't find that page
+footer: true
+---
+
+You may want to try a search above, or [visit the homepage](/).
+
+Also, here are some recent posts:
+
+
+ {% for post in site.posts limit: 10 %}
+
+ {% include archive_post.html %}
+
+ {% endfor %}
+
diff --git a/CNAME b/CNAME
index 3382a0c2..8a634083 100644
--- a/CNAME
+++ b/CNAME
@@ -1 +1 @@
-rubysec.com
\ No newline at end of file
+rubysec.com
diff --git a/Gemfile b/Gemfile
new file mode 100644
index 00000000..ed7bb3f0
--- /dev/null
+++ b/Gemfile
@@ -0,0 +1,6 @@
+source 'https://rubygems.org'
+
+gem 'github-pages'
+gem 'rake'
+
+gem "webrick", "~> 1.7"
diff --git a/README.md b/README.md
new file mode 100644
index 00000000..ac8bd49a
--- /dev/null
+++ b/README.md
@@ -0,0 +1,15 @@
+## rubysec.github.io
+
+To preview the site:
+
+ jekyll server --watch
+
+To update the advisories blog posts:
+
+ rake advisories
+
+To generate a static copy of the website:
+
+ jekyll build
+
+To deploy, simply push to github.
diff --git a/Rakefile b/Rakefile
new file mode 100644
index 00000000..a1f8f6f4
--- /dev/null
+++ b/Rakefile
@@ -0,0 +1,52 @@
+require 'date'
+require 'yaml'
+
+namespace :advisories do
+ file '_advisories' do
+ system 'git clone --depth 1 https://github.com/rubysec/ruby-advisory-db _advisories'
+ end
+
+ desc 'Updates the advisory db'
+ task :update => '_advisories' do
+ Dir.chdir('_advisories') { sh 'git pull --ff-only' } unless ENV['CI']
+ end
+
+ desc 'Regenerate the advisory posts'
+ task :generate => :update do
+ Rake::FileList['_advisories/gems/*/*.yml'].each do |advisory_path|
+ advisory = YAML.safe_load_file(advisory_path, permitted_classes: [Date])
+
+ id = if advisory['cve'] then "CVE-#{advisory['cve']}"
+ elsif advisory['ghsa'] then "GHSA-#{advisory['ghsa']}"
+ elsif advisory['osvdb'] then "OSVDB-#{advisory['osvdb']}"
+ else File.basename(advisory_path, ".*")
+ end
+ slug = "#{advisory['date']}-#{id}"
+ post = File.join('advisories', '_posts', "#{slug}.md")
+
+ File.open(post, 'w') do |file|
+ header = {
+ 'layout' => 'advisory',
+ 'title' => "#{id} (#{advisory['gem']}): #{advisory['title']}",
+ 'comments' => false,
+ 'categories' => [advisory['gem'], advisory['library'], advisory['framework'], advisory['platform']].compact,
+ 'advisory' => advisory
+ }
+
+ YAML.dump(header, file)
+ file.puts '---'
+ end
+ end
+ end
+
+ desc 'Commits changes to advisories/_posts/'
+ task :commit do
+ rev = Dir.chdir('_advisories') { %x(git rev-parse --short HEAD).strip }
+ message = "Updated advisory posts against rubysec/ruby-advisory-db@#{rev}"
+
+ sh "git add advisories/_posts/*.md"
+ sh "git commit --allow-empty -m #{message.dump} advisories/_posts/"
+ end
+end
+
+task :advisories => ['advisories:generate', 'advisories:commit']
diff --git a/_config.yml b/_config.yml
new file mode 100644
index 00000000..3a3eb9cf
--- /dev/null
+++ b/_config.yml
@@ -0,0 +1,41 @@
+url: https://rubysec.com
+title: RubySec
+subtitle: Providing security resources for the Ruby community
+author: RubySec
+simple_search: https://www.google.com/search
+description: Advisory database of security vulnerabilities found in Ruby projects
+
+exclude:
+ [
+ .bundle,
+ .github,
+ _advisories,
+ CNAME,
+ Gemfile,
+ Rakefile,
+ README.md,
+ vendor,
+ ]
+
+plugins:
+ - jekyll-paginate
+ - jekyll-sitemap
+
+subscribe_rss: /atom.xml
+
+permalink: /advisories/:title/
+category_dir: advisories/categories
+
+paginate: 10 # Posts per page on the blog index
+pagination_dir: advisories # Directory base for pagination URLs eg. /blog/page/2/
+recent_posts: 5 # Posts in the sidebar Recent Posts section
+excerpt_link: "Read on →" # "Continue reading" link text at the bottom of excerpted articles
+
+titlecase: false # Converts page and post titles to titlecase
+
+twitter_user: rubysec
+twitter_tweet_button: true
+
+github_repo: rubysec/ruby-advisory-db
+
+google_analytics: G-P90QEESFMF
diff --git a/_includes/after_footer.html b/_includes/after_footer.html
new file mode 100644
index 00000000..8d8a0434
--- /dev/null
+++ b/_includes/after_footer.html
@@ -0,0 +1,2 @@
+
+
diff --git a/_includes/archive_post.html b/_includes/archive_post.html
new file mode 100644
index 00000000..ace2dc0c
--- /dev/null
+++ b/_includes/archive_post.html
@@ -0,0 +1,9 @@
+None.
+{% endif %}
+
+
+{% for post in site.categories[page.category] %}
+{% capture this_year %}{{ post.date | date: "%Y" }}{% endcapture %}
+{% unless year == this_year %}
+ {% assign year = this_year %}
+
{{ year }}
+{% endunless %}
+
+ {% include archive_post.html %}
+
+{% endfor %}
+
diff --git a/_layouts/default.html b/_layouts/default.html
new file mode 100644
index 00000000..1d04d6d9
--- /dev/null
+++ b/_layouts/default.html
@@ -0,0 +1,19 @@
+{% capture root_url %}{% if site.baseurl != '/' %}{{ site.baseurl }}{% endif %}{% endcapture %}
+{% include head.html %}
+
+
+
+ {% if page.sidebar and site.sidebar_posn == "left" %}
+ {% include sidebar.html %}
+ {% endif %}
+
+ {% if page.sidebar and site.sidebar_posn != "left" %}
+ {% include sidebar.html %}
+ {% endif %}
+
diff --git a/_layouts/post.html b/_layouts/post.html
new file mode 100644
index 00000000..79dbcd0c
--- /dev/null
+++ b/_layouts/post.html
@@ -0,0 +1,36 @@
+---
+layout: default
+single: true
+# page.sidebar is not necessarily set for pages - assume true if not set
+---
+
+
+ {% if page.sidebar != false and site.sidebar_posn == "left" %}
+ {% include sidebar.html %}
+ {% endif %}
+
+
+ {% if page.sidebar != false and site.sidebar_posn != "left" %}
+ {% include sidebar.html %}
+ {% endif %}
+
diff --git a/advisories/_posts/2006-05-14-CVE-2006-2581.md b/advisories/_posts/2006-05-14-CVE-2006-2581.md
new file mode 100644
index 00000000..1348a39c
--- /dev/null
+++ b/advisories/_posts/2006-05-14-CVE-2006-2581.md
@@ -0,0 +1,46 @@
+---
+layout: advisory
+title: 'CVE-2006-2581 (rwiki): RWiki before 2.1.1 has cross-site scripting vulnerability'
+comments: false
+categories:
+- rwiki
+advisory:
+ gem: rwiki
+ cve: 2006-2581
+ ghsa: gvhx-gj42-m28v
+ url: https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html
+ title: RWiki before 2.1.1 has cross-site scripting vulnerability
+ date: 2006-05-14
+ description: |
+ Cross-site scripting (XSS) vulnerability in Wiki content in
+ RWiki 2.1.0pre1 through 2.1.0 allows remote attackers to inject
+ arbitrary web script or HTML via unknown attack vectors.
+ cvss_v2: 4.3
+ unaffected_versions:
+ - "< 2.1.0pre1"
+ patched_versions:
+ - ">= 2.1.1"
+ related:
+ cve:
+ - 2006-2582
+ ghsa:
+ - wwmf-6p58-6vj2
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2006-2581
+ - https://exchange.xforce.ibmcloud.com/vulnerabilities/26664
+ - https://github.com/advisories/GHSA-wwmf-6p58-6vj2
+ - https://github.com/advisories/GHSA-gvhx-gj42-m28v
+ - https://rubygems.org/gems/rwiki
+ - https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html
+ - https://web.archive.org/web/20090504061152/http://pub.cozmixng.org/~the-rwiki/rw-cgi.rb?cmd=view;name=top
+ - https://web.archive.org/web/20081201080215/http://secunia.com/advisories/20264
+ - https://web.archive.org/web/20090524010623/http://www.vupen.com/english/advisories/2006/1949
+ notes: |
+ - Best references are in Japanese.
+ - Source code link on rubygems.org goes to
+ lucassus/rwiki (last version 0.2.5, not 2.1.1).
+ - Found two other repos:
+ - https://github.com/rwiki/rwiki
+ - https://github.com/ytakhs/rwiki
+ - CWE: [NVD-CWE-Other] MODERATE
+---
diff --git a/advisories/_posts/2006-05-14-CVE-2006-2582.md b/advisories/_posts/2006-05-14-CVE-2006-2582.md
new file mode 100644
index 00000000..9b39c62f
--- /dev/null
+++ b/advisories/_posts/2006-05-14-CVE-2006-2582.md
@@ -0,0 +1,45 @@
+---
+layout: advisory
+title: 'CVE-2006-2582 (rwiki): High severity vulnerability that affects rwiki'
+comments: false
+categories:
+- rwiki
+advisory:
+ gem: rwiki
+ cve: 2006-2582
+ ghsa: wwmf-6p58-6vj2
+ url: https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html
+ title: High severity vulnerability that affects rwiki
+ date: 2006-05-14
+ description: |
+ The editing form in RWiki 2.1.0pre1 through 2.1.0 allows remote
+ attackers to execute arbitrary Ruby code via unknown attack vectors.
+ cvss_v2: 7.5
+ unaffected_versions:
+ - "< 2.1.0pre1"
+ patched_versions:
+ - ">= 2.1.1"
+ related:
+ cve:
+ - 2006-2581
+ ghsa:
+ - gvhx-gj42-m28v
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2006-2582
+ - https://exchange.xforce.ibmcloud.com/vulnerabilities/26664
+ - https://github.com/advisories/GHSA-wwmf-6p58-6vj2
+ - https://github.com/advisories/GHSA-gvhx-gj42-m28v
+ - https://rubygems.org/gems/rwiki
+ - https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html
+ - https://web.archive.org/web/20090504061152/http://pub.cozmixng.org/~the-rwiki/rw-cgi.rb?cmd=view;name=top
+ - https://web.archive.org/web/20081201080215/http://secunia.com/advisories/20264
+ - https://web.archive.org/web/20090524010623/http://www.vupen.com/english/advisories/2006/1949
+ notes: |
+ - Best references are in Japanese.
+ - Source code link on rubygems.org goes to
+ lucassus/rwiki (last version 0.2.5, not 2.1.1).
+ - Found two other repos:
+ - https://github.com/rwiki/rwiki
+ - https://github.com/ytakhs/rwiki
+ - CWE: [NVD-CWE-Other] MODERATE
+---
diff --git a/advisories/_posts/2007-01-22-CVE-2007-0469.md b/advisories/_posts/2007-01-22-CVE-2007-0469.md
new file mode 100644
index 00000000..1dd3975d
--- /dev/null
+++ b/advisories/_posts/2007-01-22-CVE-2007-0469.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2007-0469 (rubygems-update): CVE-2007-0469 RubyGems: Specially-crafted
+ Gem archive can overwrite system files'
+comments: false
+categories:
+- rubygems-update
+- rubygems
+advisory:
+ gem: rubygems-update
+ library: rubygems
+ cve: 2007-0469
+ osvdb: 33561
+ ghsa: 95vx-q4c2-64gr
+ url: https://nvd.nist.gov/vuln/detail/CVE-2007-0469
+ title: 'CVE-2007-0469 RubyGems: Specially-crafted Gem archive can overwrite system
+ files'
+ date: 2007-01-22
+ description: |
+ The extract_files function in installer.rb in RubyGems before 0.9.1 does
+ not check whether files exist before overwriting them, which allows user-assisted
+ remote attackers to overwrite arbitrary files, cause a denial of service, or execute
+ arbitrary code via crafted GEM packages.
+ cvss_v2: 9.3
+ patched_versions:
+ - ">= 0.9.1"
+---
diff --git a/advisories/_posts/2007-05-21-OSVDB-101157.md b/advisories/_posts/2007-05-21-OSVDB-101157.md
new file mode 100644
index 00000000..df4b2e1f
--- /dev/null
+++ b/advisories/_posts/2007-05-21-OSVDB-101157.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'OSVDB-101157 (json): json Gem for Ruby Data Handling Stack Buffer Overflow'
+comments: false
+categories:
+- json
+advisory:
+ gem: json
+ osvdb: 101157
+ url: https://security.snyk.io/vuln/SNYK-RUBY-JSON-20000
+ title: json Gem for Ruby Data Handling Stack Buffer Overflow
+ date: 2007-05-21
+ description: |
+ json Gem for Ruby contains an overflow condition that is triggered as
+ user-supplied input is not properly validated when handling specially crafted
+ data. This may allow a remote attacker to cause a stack-based buffer
+ overflow, resulting in a denial of service or potentially allowing the
+ execution of arbitrary code.
+ patched_versions:
+ - ">= 1.1.0"
+ related:
+ url:
+ - https://security.snyk.io/vuln/SNYK-RUBY-JSON-20000
+ - http://osvdb.org/show/osvdb/101157
+---
diff --git a/advisories/_posts/2007-06-15-OSVDB-95668.md b/advisories/_posts/2007-06-15-OSVDB-95668.md
new file mode 100644
index 00000000..8b889e36
--- /dev/null
+++ b/advisories/_posts/2007-06-15-OSVDB-95668.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'OSVDB-95668 (builder): Builder Gem for Ruby Tag Name Handling Private Method
+ Exposure'
+comments: false
+categories:
+- builder
+advisory:
+ gem: builder
+ osvdb: 95668
+ url: https://my.diffend.io/gems/builder/2.1.1/2.1.2
+ title: Builder Gem for Ruby Tag Name Handling Private Method Exposure
+ date: 2007-06-15
+ description: |
+ Builder Gem for Ruby contains a flaw in the handling of tag names. The issue
+ is triggered when the program reads tag names from XML data and then calls a
+ method with that name. With a specially crafted file, a context-dependent
+ attacker can call private methods and manipulate data.
+ patched_versions:
+ - ">= 2.1.2"
+ related:
+ url:
+ - https://my.diffend.io/gems/builder/2.1.1/2.1.2
+ - http://osvdb.org/show/osvdb/95668
+---
diff --git a/advisories/_posts/2007-11-27-CVE-2007-6183.md b/advisories/_posts/2007-11-27-CVE-2007-6183.md
new file mode 100644
index 00000000..1a0ffd83
--- /dev/null
+++ b/advisories/_posts/2007-11-27-CVE-2007-6183.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2007-6183 (gtk2): CVE-2007-6183 ruby-gnome2: format string vulnerability'
+comments: false
+categories:
+- gtk2
+advisory:
+ gem: gtk2
+ cve: 2007-6183
+ osvdb: 40774
+ ghsa: xgj6-pgrm-x4r2
+ url: https://nvd.nist.gov/vuln/detail/CVE-2007-6183
+ title: 'CVE-2007-6183 ruby-gnome2: format string vulnerability'
+ date: 2007-11-27
+ description: |
+ Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c
+ in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows
+ context-dependent attackers to execute arbitrary code via format string specifiers
+ in the message parameter.
+ cvss_v2: 6.8
+ patched_versions:
+ - "> 0.16.0"
+---
diff --git a/advisories/_posts/2008-08-12-CVE-2008-7311.md b/advisories/_posts/2008-08-12-CVE-2008-7311.md
new file mode 100644
index 00000000..716d1cd7
--- /dev/null
+++ b/advisories/_posts/2008-08-12-CVE-2008-7311.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2008-7311 (spree): Spree Hardcoded config.action_controller_session Hash
+ Value Cryptographic Protection Weakness'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ cve: 2008-7311
+ osvdb: 81506
+ ghsa: g466-57gh-cqfw
+ url: https://spreecommerce.com/blog/security-vulernability-session-cookie-store
+ title: Spree Hardcoded config.action_controller_session Hash Value Cryptographic
+ Protection Weakness
+ date: 2008-08-12
+ description: |
+ Spree contains a hardcoded flaw related to the
+ config.action_controller_session hash value. This may allow an attacker to
+ more easily bypass cryptographic protection.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 0.3.0"
+---
diff --git a/advisories/_posts/2008-08-15-OSVDB-95749.md b/advisories/_posts/2008-08-15-OSVDB-95749.md
new file mode 100644
index 00000000..8a250277
--- /dev/null
+++ b/advisories/_posts/2008-08-15-OSVDB-95749.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'OSVDB-95749 (activeresource): activeresource Gem for Ruby lib/active_resource/connection.rb
+ request Function Multiple Variable Format String'
+comments: false
+categories:
+- activeresource
+advisory:
+ gem: activeresource
+ osvdb: 95749
+ url: https://my.diffend.io/gems/activeresource/versions/2.1.0
+ title: activeresource Gem for Ruby lib/active_resource/connection.rb request Function
+ Multiple Variable Format String
+ date: 2008-08-15
+ description: |
+ activeresource contains a format string flaw in the request function of
+ lib/active_resource/connection.rb. The issue is triggered as format string
+ specifiers (e.g. %s and %x) are not properly sanitized in user-supplied input
+ when passed via the 'result.code' and 'result.message' variables. This may
+ allow a remote attacker to cause a denial of service or potentially execute
+ arbitrary code.
+ patched_versions:
+ - ">= 2.2.0"
+ related:
+ url:
+ - https://my.diffend.io/gems/activeresource/versions/2.1.0
+ - https://security.snyk.io/vuln/SNYK-RUBY-ACTIVERESOURCE-20004
+ - http://osvdb.org/show/osvdb/95749
+---
diff --git a/advisories/_posts/2008-09-22-CVE-2008-7310.md b/advisories/_posts/2008-09-22-CVE-2008-7310.md
new file mode 100644
index 00000000..fc68fd35
--- /dev/null
+++ b/advisories/_posts/2008-09-22-CVE-2008-7310.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2008-7310 (spree): Spree Hash Restriction Weakness URL Parsing Order State
+ Value Manipulation'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ cve: 2008-7310
+ osvdb: 81505
+ ghsa: 7h48-m3rw-vr27
+ url: https://spreecommerce.com/blog/security-vulnerability-mass-assignment
+ title: Spree Hash Restriction Weakness URL Parsing Order State Value Manipulation
+ date: 2008-09-22
+ description: |
+ Spree contains a hash restriction weakness that occurs when parsing a
+ modified URL. This may allow an attacker to manipulate order state values.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 0.3.0"
+---
diff --git a/advisories/_posts/2008-10-10-OSVDB-95376.md b/advisories/_posts/2008-10-10-OSVDB-95376.md
new file mode 100644
index 00000000..c57a2f91
--- /dev/null
+++ b/advisories/_posts/2008-10-10-OSVDB-95376.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'OSVDB-95376 (activerecord-oracle_enhanced-adapter): Oracle "enhanced" ActiveRecord
+ Gem for Ruby :limit / :offset SQL Injection'
+comments: false
+categories:
+- activerecord-oracle_enhanced-adapter
+advisory:
+ gem: activerecord-oracle_enhanced-adapter
+ osvdb: 95376
+ url: https://www.versioneye.com/Ruby/activerecord-oracle_enhanced-adapter/1.1.6
+ title: Oracle "enhanced" ActiveRecord Gem for Ruby :limit / :offset SQL Injection
+ date: 2008-10-10
+ description: |
+ Oracle "enhanced" ActiveRecord Gem for Ruby contains a flaw that may allow an
+ attacker to carry out an SQL injection attack. The issue is due to the
+ program not properly sanitizing user-supplied input related to the :limit and
+ :offset functions. This may allow an attacker to inject or manipulate SQL
+ queries in the back-end database, allowing for the manipulation or disclosure
+ of arbitrary data.
+ patched_versions:
+ - ">= 1.1.8"
+ related:
+ url:
+ - https://www.versioneye.com/Ruby/activerecord-oracle_enhanced-adapter/1.1.6
+ - https://security.snyk.io/vuln/SNYK-RUBY-ACTIVERECORDORACLEENHANCEDADAPTER-20006
+ - http://osvdb.org/show/osvdb/95376
+---
diff --git a/advisories/_posts/2008-12-08-CVE-2008-4310.md b/advisories/_posts/2008-12-08-CVE-2008-4310.md
new file mode 100644
index 00000000..60c093ed
--- /dev/null
+++ b/advisories/_posts/2008-12-08-CVE-2008-4310.md
@@ -0,0 +1,33 @@
+---
+layout: advisory
+title: 'CVE-2008-4310 (webrick): WEBrick Denial of Service Vulnerability'
+comments: false
+categories:
+- webrick
+advisory:
+ gem: webrick
+ cve: 2008-4310
+ ghsa: wfrc-r6c6-7j9r
+ url: https://bugzilla.redhat.com/show_bug.cgi?id=470252
+ title: WEBrick Denial of Service Vulnerability
+ date: 2008-12-08
+ description: |
+ httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat
+ Enterprise Linux 4 and 5, allows remote attackers to cause a
+ denial of service (CPU consumption) via a crafted HTTP request.
+
+ NOTE: This issue exists because of an incomplete fix for CVE-2008-3656.
+ cvss_v2: 7.8
+ patched_versions:
+ - ">= 1.3.1"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2008-4310
+ - https://github.com/ruby/webrick/commit/b2ccd5ff7ddd67a4548299e110dcc5a4728a5534
+ - http://www.openwall.com/lists/oss-security/2008/12/04/2
+ - https://bugzilla.redhat.com/show_bug.cgi?id=470252
+ - https://oval.cisecurity.org/repository/search/definition/oval
+ - http://www.redhat.com/support/errata/RHSA-2008-0981.html
+ - https://web.archive.org/web/20111230125610/http://secunia.com/advisories/33013
+ - https://github.com/advisories/GHSA-wfrc-r6c6-7j9r
+---
diff --git a/advisories/_posts/2009-07-10-CVE-2009-2422.md b/advisories/_posts/2009-07-10-CVE-2009-2422.md
new file mode 100644
index 00000000..4bdfc104
--- /dev/null
+++ b/advisories/_posts/2009-07-10-CVE-2009-2422.md
@@ -0,0 +1,38 @@
+---
+layout: advisory
+title: 'CVE-2009-2422 (rails): High Security Vulnerability with authenticate_with_http_digest
+ of Rails'
+comments: false
+categories:
+- rails
+- rails
+advisory:
+ gem: rails
+ framework: rails
+ cve: 2009-2422
+ ghsa: rxq3-gm4p-5fj4
+ url: http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest
+ title: High Security Vulnerability with authenticate_with_http_digest of Rails
+ date: 2009-07-10
+ description: |
+ The example code for the digest authentication functionality
+ (http_authentication.rb) in Ruby on Rails before 2.3.3 defines
+ an authenticate_or_request_with_http_digest block that returns
+ nil instead of false when the user does not exist, which allows
+ context-dependent attackers to bypass authentication for
+ applications that are derived from this example by sending an
+ invalid username without a password.
+ cvss_v2: 7.5
+ cvss_v3: 9.8
+ patched_versions:
+ - ">= 2.3.3"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2009-2422
+ - http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest
+ - https://lists.apple.com/archives/security-announce/2010/Mar/msg00001.html
+ - https://exchange.xforce.ibmcloud.com/vulnerabilities/51528
+ - http://support.apple.com/kb/HT4077
+ - http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s
+ - https://github.com/advisories/GHSA-rxq3-gm4p-5fj4
+---
diff --git a/advisories/_posts/2009-12-07-CVE-2009-4123.md b/advisories/_posts/2009-12-07-CVE-2009-4123.md
new file mode 100644
index 00000000..499a616a
--- /dev/null
+++ b/advisories/_posts/2009-12-07-CVE-2009-4123.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2009-4123 (jruby-openssl): jruby-openssl Gem for JRuby fails to do proper
+ certificate validation'
+comments: false
+categories:
+- jruby-openssl
+- jruby
+advisory:
+ gem: jruby-openssl
+ platform: jruby
+ cve: 2009-4123
+ ghsa: xgv7-pqqh-h2w9
+ url: http://jruby.org/2009/12/07/vulnerability-in-jruby-openssl
+ title: jruby-openssl Gem for JRuby fails to do proper certificate validation
+ date: 2009-12-07
+ description: |
+ A security problem involving peer certificate verification was found where
+ failed verification silently did nothing, making affected applications
+ vulnerable to attackers. Attackers could lead a client application to believe
+ that a secure connection to a rogue SSL server is legitimate. Attackers could
+ also penetrate client-validated SSL server applications with a dummy
+ certificate.
+ cvss_v3: 7.5
+ patched_versions:
+ - ">= 0.6"
+---
diff --git a/advisories/_posts/2010-02-01-OSVDB-62067.md b/advisories/_posts/2010-02-01-OSVDB-62067.md
new file mode 100644
index 00000000..7b414abe
--- /dev/null
+++ b/advisories/_posts/2010-02-01-OSVDB-62067.md
@@ -0,0 +1,37 @@
+---
+layout: advisory
+title: 'OSVDB-62067 (bcrypt): bcrypt-ruby Gem for Ruby incorrect encoding of non US-ASCII
+ characters (JRuby only)'
+comments: false
+categories:
+- bcrypt
+- jruby
+advisory:
+ gem: bcrypt
+ platform: jruby
+ osvdb: 62067
+ url: http://www.mindrot.org/files/jBCrypt/internat.adv
+ title: bcrypt-ruby Gem for Ruby incorrect encoding of non US-ASCII characters (JRuby
+ only)
+ date: 2010-02-01
+ description: |
+ In https://security.snyk.io/vuln/SNYK-RUBY-BCRYPT-20009, found
+ "The advisory has been revoked - it doesn't affect any version of package bcrypt"
+
+ bcrypt-ruby Gem for Ruby suffered from a bug related to character
+ encoding that substantially reduced the entropy of hashed passwords
+ containing non US-ASCII characters. An incorrect encoding step
+ transparently replaced such characters by '?' prior to hashing.
+ In the worst case of a password consisting solely of non-US-ASCII
+ characters, this would cause its hash to be equivalent to all other
+ such passwords of the same length.
+
+ This issue only affects the JRuby implementation.
+ patched_versions:
+ - ">= 2.1.4"
+ related:
+ url:
+ - https://github.com/jeremyh/jBCrypt
+ - http://www.mindrot.org/files/jBCrypt/internat.adv
+ - https://github.com/bcrypt-ruby/bcrypt-ruby/blob/master/ext/jruby/bcrypt_jruby/BCrypt.java
+---
diff --git a/advisories/_posts/2010-04-27-OSVDB-110439.md b/advisories/_posts/2010-04-27-OSVDB-110439.md
new file mode 100644
index 00000000..b3828ec5
--- /dev/null
+++ b/advisories/_posts/2010-04-27-OSVDB-110439.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'OSVDB-110439 (fog-dragonfly): Dragonfly Gem for Ruby Image Uploading & Processing
+ Remote Command Execution'
+comments: false
+categories:
+- fog-dragonfly
+advisory:
+ gem: fog-dragonfly
+ osvdb: 110439
+ url: https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20193
+ title: Dragonfly Gem for Ruby Image Uploading & Processing Remote Command Execution
+ date: 2010-04-27
+ description: |
+ Dragonfly Gem for Ruby contains a flaw in Uploading & Processing
+ that is due to the gem failing to restrict arbitrary commands to
+ imagemagicks convert. This may allow a remote attacker to gain
+ read/write access to the filesystem and execute arbitrary commands.
+
+ This gem has been renamed. Please use "dragonfly" from now on.
+ patched_versions:
+ - ">= 0.8.4"
+ related:
+ url:
+ - https://github.com/markevans/dragonfly/compare/v0.8.3...v0.8.4
+ - https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20193
+ - https://www.mend.io/vulnerability-database/WS-2014-0016
+ - http://osvdb.org/show/osvdb/110439
+---
diff --git a/advisories/_posts/2010-08-12-OSVDB-114600.md b/advisories/_posts/2010-08-12-OSVDB-114600.md
new file mode 100644
index 00000000..5ba2b8c1
--- /dev/null
+++ b/advisories/_posts/2010-08-12-OSVDB-114600.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'OSVDB-114600 (curb): curb Gem for Ruby Empty http_put Body Handling Remote
+ DoS'
+comments: false
+categories:
+- curb
+advisory:
+ gem: curb
+ osvdb: 114600
+ url: https://my.diffend.io/gems/curb/versions/0.6.4.0
+ title: curb Gem for Ruby Empty http_put Body Handling Remote DoS
+ date: 2010-08-12
+ description: |
+ curb Gem for Ruby contains a flaw that is triggered when handling
+ an empty http_put body. This may allow a remote attacker to crash
+ an application linked against the library.
+ patched_versions:
+ - ">= 0.7.8"
+ related:
+ url:
+ - https://my.diffend.io/gems/curb/versions/0.6.4.0
+ - https://my.diffend.io/gems/curb/0.7.7.1/0.7.8
+ - http://osvdb.org/show/osvdb/114600
+---
diff --git a/advisories/_posts/2010-11-02-CVE-2010-3978.md b/advisories/_posts/2010-11-02-CVE-2010-3978.md
new file mode 100644
index 00000000..d5d1f517
--- /dev/null
+++ b/advisories/_posts/2010-11-02-CVE-2010-3978.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2010-3978 (spree): Spree Multiple Script JSON Request Validation Weakness
+ Remote Information Disclosure'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ cve: 2010-3978
+ osvdb: 69098
+ ghsa: hwrx-wc75-mgh7
+ url: https://spreecommerce.com/blog/json-hijacking-vulnerability
+ title: Spree Multiple Script JSON Request Validation Weakness Remote Information
+ Disclosure
+ date: 2010-11-02
+ description: |
+ Spree contains a flaw that may lead to an unauthorized information
+ disclosure. The issue is triggered when the application exchanges data using
+ the JSON service without validating requests, which will disclose sensitive
+ user and order information to a context-dependent attacker when a logged-in
+ user visits a crafted website.
+ cvss_v2: 5.0
+ patched_versions:
+ - "~> 0.11.2"
+ - ">= 0.30.0"
+---
diff --git a/advisories/_posts/2011-01-12-OSVDB-106954.md b/advisories/_posts/2011-01-12-OSVDB-106954.md
new file mode 100644
index 00000000..396e5517
--- /dev/null
+++ b/advisories/_posts/2011-01-12-OSVDB-106954.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'OSVDB-106954 (quick_magick): quick_magick Gem for Ruby QuickMagick::Image.read
+ Function Crafted String Handling Remote Command Injection'
+comments: false
+categories:
+- quick_magick
+advisory:
+ gem: quick_magick
+ osvdb: 106954
+ url: https://security.snyk.io/vuln/SNYK-RUBY-QUICKMAGICK-20012
+ title: quick_magick Gem for Ruby QuickMagick::Image.read Function Crafted String
+ Handling Remote Command Injection
+ date: 2011-01-12
+ description: |
+ quick_magick Gem for Ruby contains a flaw in the QuickMagick::Image.read
+ function. The issue is triggered when handling a specially crafted string.
+ This may allow a remote attacker to inject arbitrary commands.
+ notes: Never patched
+ related:
+ url:
+ - https://security.snyk.io/vuln/SNYK-RUBY-QUICKMAGICK-20012
+ - http://osvdb.org/show/osvdb/106954
+---
diff --git a/advisories/_posts/2011-01-25-CVE-2011-0739.md b/advisories/_posts/2011-01-25-CVE-2011-0739.md
new file mode 100644
index 00000000..d176fbc5
--- /dev/null
+++ b/advisories/_posts/2011-01-25-CVE-2011-0739.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2011-0739 (mail): Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb
+ Email From: Address Arbitrary Shell Command Injection'
+comments: false
+categories:
+- mail
+advisory:
+ gem: mail
+ cve: 2011-0739
+ osvdb: 70667
+ ghsa: cpjc-p7fc-j9xh
+ url: https://nvd.nist.gov/vuln/detail/CVE-2011-0739
+ title: 'Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb Email From:
+ Address Arbitrary Shell Command Injection'
+ date: 2011-01-25
+ description: |
+ Mail Gem for Ruby contains a flaw related to the failure to properly sanitise
+ input passed from an email from address in the 'deliver()' function in
+ 'lib/mail/network/delivery_methods/sendmail.rb' before being used as a
+ command line argument. This may allow a remote attacker to inject arbitrary
+ shell commands.
+ cvss_v2: 6.8
+ patched_versions:
+ - ">= 2.2.15"
+---
diff --git a/advisories/_posts/2011-04-19-OSVDB-73751.md b/advisories/_posts/2011-04-19-OSVDB-73751.md
new file mode 100644
index 00000000..d897a11b
--- /dev/null
+++ b/advisories/_posts/2011-04-19-OSVDB-73751.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'OSVDB-73751 (spree): Spree Content Controller Unspecified Arbitrary File Disclosure'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ osvdb: 73751
+ url: https://web.archive.org/web/20160331142302/https://spreecommerce.com/blog/security-fixes
+ title: Spree Content Controller Unspecified Arbitrary File Disclosure
+ date: 2011-04-19
+ description: |
+ Spree Gem for Ruby would allow a user to request a specially crafted URL and
+ expose arbitrary files on the server
+ patched_versions:
+ - ">= 0.50.1"
+ related:
+ url:
+ - https://web.archive.org/web/20160331142302/https://spreecommerce.com/blog/security-fixes
+ - https://seclists.org/oss-sec/2015/q3/275
+ - https://github.com/spree/spree/commit/0a2ee5fc68b22b8257e8a6cf1811598293416d33
+---
diff --git a/advisories/_posts/2011-05-13-CVE-2011-0995.md b/advisories/_posts/2011-05-13-CVE-2011-0995.md
new file mode 100644
index 00000000..29819acc
--- /dev/null
+++ b/advisories/_posts/2011-05-13-CVE-2011-0995.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2011-0995 (sqlite3-ruby): rubygem-sqlite3 gem uses weak file permissions'
+comments: false
+categories:
+- sqlite3-ruby
+advisory:
+ gem: sqlite3-ruby
+ cve: 2011-0995
+ ghsa: 6x46-7rrv-m4h8
+ osvdb: 72180
+ url: https://www.suse.com/security/cve/CVE-2011-0995.html
+ title: rubygem-sqlite3 gem uses weak file permissions
+ date: 2011-05-13
+ description: |
+ The sqlite3-ruby gem in the rubygem-sqlite3 package before
+ 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak
+ permissions for unspecified files, which allows local users
+ to gain privileges via unknown vectors.
+ cvss_v2: 2.1
+ patched_versions:
+ - ">= 1.2.4"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2011-0995
+ - https://www.suse.com/security/cve/CVE-2011-0995.html
+ - http://www.osvdb.org/72180
+ - https://github.com/advisories/GHSA-6x46-7rrv-m4h8
+ - https://exchange.xforce.ibmcloud.com/vulnerabilities/67263
+ - https://ubuntu.com/security/CVE-2011-0995
+ - https://cve.circl.lu/cve/CVE-2011-0995
+---
diff --git a/advisories/_posts/2011-08-16-CVE-2011-3186.md b/advisories/_posts/2011-08-16-CVE-2011-3186.md
new file mode 100644
index 00000000..33e69265
--- /dev/null
+++ b/advisories/_posts/2011-08-16-CVE-2011-3186.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2011-3186 (actionpack): Response Splitting Vulnerability in Ruby on Rails'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2011-3186
+ osvdb: 74616
+ ghsa: fcqf-h4h4-695m
+ url: https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g
+ title: Response Splitting Vulnerability in Ruby on Rails
+ date: 2011-08-16
+ description: |
+ A response splitting flaw in Ruby on Rails 2.3.x was reported that could allow
+ a remote attacker to inject arbitrary HTTP headers into a response due to
+ insufficient sanitization of the values provided for response content types.
+ cvss_v2: 4.3
+ patched_versions:
+ - ">= 2.3.13"
+---
diff --git a/advisories/_posts/2011-09-01-CVE-2011-4969.md b/advisories/_posts/2011-09-01-CVE-2011-4969.md
new file mode 100644
index 00000000..c559be29
--- /dev/null
+++ b/advisories/_posts/2011-09-01-CVE-2011-4969.md
@@ -0,0 +1,34 @@
+---
+layout: advisory
+title: 'CVE-2011-4969 (jquery-rails): jQuery vulnerable to Cross-Site Scripting (XSS)'
+comments: false
+categories:
+- jquery-rails
+advisory:
+ gem: jquery-rails
+ cve: 2011-4969
+ ghsa: 579v-mp3v-rrw5
+ url: http://blog.jquery.com/2011/09/01/jquery-1-6-3-released
+ title: jQuery vulnerable to Cross-Site Scripting (XSS)
+ date: 2011-09-01
+ description: |
+ Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3,
+ when using location.hash to select elements, allows remote attackers
+ to inject arbitrary web script or HTML via a crafted tag.
+ cvss_v2: 4.3
+ patched_versions:
+ - ">= 1.6.3"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2011-4969
+ - http://blog.jquery.com/2011/09/01/jquery-1-6-3-released
+ - http://blog.mindedsecurity.com/2011/07/jquery-is-sink.html
+ - http://bugs.jquery.com/ticket/9521
+ - https://github.com/jquery/jquery/commit/db9e023e62c1ff5d8f21ed9868ab6878da2005e9
+ - https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8
+ - https://security.netapp.com/advisory/ntap-20190416-0007
+ - http://www.openwall.com/lists/oss-security/2013/01/31/3
+ - http://www.ubuntu.com/usn/USN-1722-1
+ - https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450224
+ - https://github.com/advisories/GHSA-579v-mp3v-rrw5
+---
diff --git a/advisories/_posts/2011-09-01-OSVDB-97854.md b/advisories/_posts/2011-09-01-OSVDB-97854.md
new file mode 100644
index 00000000..966b9313
--- /dev/null
+++ b/advisories/_posts/2011-09-01-OSVDB-97854.md
@@ -0,0 +1,30 @@
+---
+layout: advisory
+title: 'OSVDB-97854 (fog-dragonfly): Dragonfly Gem for Ruby on Windows Shell Escaping
+ Weakness'
+comments: false
+categories:
+- fog-dragonfly
+advisory:
+ gem: fog-dragonfly
+ osvdb: 97854
+ url: https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20016
+ title: Dragonfly Gem for Ruby on Windows Shell Escaping Weakness
+ date: 2011-09-01
+ description: |
+ Dragonfly Gem for Ruby contains a flaw that is due to the program
+ failing to properly escape a shell that contains injected characters.
+ This may allow a context-dependent attacker to potentially execute
+ arbitrary commands.
+
+ This gem has been renamed. Please use "dragonfly" from now on.
+ patched_versions:
+ - ">= 0.9.6"
+ related:
+ url:
+ - https://github.com/markevans/dragonfly/blob/master/spec/dragonfly/shell_spec.rb#L26
+ - https://github.com/markevans/dragonfly/pull/506
+ - https://github.com/markevans/dragonfly/commit/f4f8e37a171a34f0ef3a6d80b52f44ed4d66d3bc
+ - https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20016
+ - http://osvdb.org/show/osvdb/97854
+---
diff --git a/advisories/_posts/2011-09-20-OSVDB-115917.md b/advisories/_posts/2011-09-20-OSVDB-115917.md
new file mode 100644
index 00000000..17611972
--- /dev/null
+++ b/advisories/_posts/2011-09-20-OSVDB-115917.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'OSVDB-115917 (bundler): Bundler Gem for Ruby install Command Process Listing
+ Local Plaintext Credential Disclosure'
+comments: false
+categories:
+- bundler
+advisory:
+ gem: bundler
+ osvdb: 115917
+ url: https://my.diffend.io/gems/bundler/versions/1.0.0.beta.8
+ title: Bundler Gem for Ruby install Command Process Listing Local Plaintext Credential
+ Disclosure
+ date: 2011-09-20
+ description: |
+ Bundler Gem for Ruby contains a flaw that is due to the program listing
+ credential information in plaintext in the install command process listing.
+ This may allow a local attacker to gain access to credential information.
+ patched_versions:
+ - ">= 1.1.rc"
+ related:
+ url:
+ - https://my.diffend.io/gems/bundler/versions/1.0.0.beta.8
+ - https://my.diffend.io/gems/bundler/versions/1.1.rc
+ - https://github.com/rubygems/bundler/commit/95bb14483cf8af857dc901c22db48cd3057d243e
+ - https://github.com/rubygems/bundler/pull/1463
+ - https://github.com/rubygems/bundler/issues/1440
+ - http://www.osvdb.org/show/osvdb/115917
+---
diff --git a/advisories/_posts/2011-10-05-OSVDB-76011.md b/advisories/_posts/2011-10-05-OSVDB-76011.md
new file mode 100644
index 00000000..6dd9072c
--- /dev/null
+++ b/advisories/_posts/2011-10-05-OSVDB-76011.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'OSVDB-76011 (spree): Spree Search ProductScope Class search[send][] Parameter
+ Arbitrary Command Execution'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ osvdb: 76011
+ url: https://web.archive.org/web/20121124215359/https://spreecommerce.com/blog/remote-command-product-group
+ title: Spree Search ProductScope Class search[send][] Parameter Arbitrary Command
+ Execution
+ date: 2011-10-05
+ description: |
+ The ProductScope class fails to properly sanitize user-supplied input via the
+ 'search[send][]' parameter resulting in arbitrary command execution. With a
+ specially crafted request, a remote attacker can potentially cause arbitrary
+ command execution.
+ patched_versions:
+ - ">= 0.60.2"
+ related:
+ url:
+ - https://web.archive.org/web/20121124215359/https://spreecommerce.com/blog/remote-command-product-group
+---
diff --git a/advisories/_posts/2011-10-27-CVE-2011-3870.md b/advisories/_posts/2011-10-27-CVE-2011-3870.md
new file mode 100644
index 00000000..f5edf429
--- /dev/null
+++ b/advisories/_posts/2011-10-27-CVE-2011-3870.md
@@ -0,0 +1,37 @@
+---
+layout: advisory
+title: 'CVE-2011-3870 (puppet): Puppet allows local users to modify the permissions
+ of arbitrary files'
+comments: false
+categories:
+- puppet
+advisory:
+ gem: puppet
+ cve: 2011-3870
+ ghsa: qh3g-27jf-3j54
+ url: https://puppet.com/security/cve/cve-2011-3870
+ title: Puppet allows local users to modify the permissions of arbitrary files
+ date: 2011-10-27
+ description: |
+ Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x
+ allows local users to modify the permissions of arbitrary
+ files via a symlink attack on the SSH authorized_keys file.
+ cvss_v2: 6.3
+ patched_versions:
+ - "~> 2.6.11"
+ - ">= 2.7.5"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2011-3870
+ - https://puppet.com/security/cve/cve-2011-3870
+ - https://github.com/puppetlabs/puppet/commit/88512e880bd2a03694b5fef42540dc7b3da05d30
+ - https://github.com/puppetlabs/puppet/commit/b29b1785d543a3cea961fffa9b3c15f14ab7cce0
+ - http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb
+ - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html
+ - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html
+ - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html
+ - http://www.debian.org/security/2011/dsa-2314
+ - http://www.ubuntu.com/usn/USN-1223-1
+ - http://www.ubuntu.com/usn/USN-1223-2
+ - https://github.com/advisories/GHSA-qh3g-27jf-3j54
+---
diff --git a/advisories/_posts/2011-10-27-CVE-2011-3871.md b/advisories/_posts/2011-10-27-CVE-2011-3871.md
new file mode 100644
index 00000000..3d0b7927
--- /dev/null
+++ b/advisories/_posts/2011-10-27-CVE-2011-3871.md
@@ -0,0 +1,38 @@
+---
+layout: advisory
+title: 'CVE-2011-3871 (puppet): Puppet uses predictable filenames, allowing arbitrary
+ file overwrite'
+comments: false
+categories:
+- puppet
+advisory:
+ gem: puppet
+ cve: 2011-3871
+ ghsa: mpmx-gm5v-q789
+ url: https://puppet.com/security/cve/cve-2011-3871
+ title: Puppet uses predictable filenames, allowing arbitrary file overwrite
+ date: 2011-10-27
+ description: |
+ Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x,
+ when running in `--edit` mode, uses a predictable file name, which
+ allows local users to run arbitrary Puppet code or trick a user
+ into editing arbitrary files.
+ cvss_v2: 6.2
+ patched_versions:
+ - "~> 2.6.11"
+ - ">= 2.7.5"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2011-3871
+ - https://puppet.com/security/cve/cve-2011-3871
+ - https://github.com/puppetlabs/puppet/commit/343c7bd381b63e042d437111718918f951d9b30d
+ - https://github.com/puppetlabs/puppet/commit/d76c30935460ded953792dfe49f72b8c5158e899
+ - http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb
+ - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html
+ - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html
+ - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html
+ - http://www.debian.org/security/2011/dsa-2314
+ - http://www.ubuntu.com/usn/USN-1223-1
+ - http://www.ubuntu.com/usn/USN-1223-2
+ - https://github.com/advisories/GHSA-mpmx-gm5v-q789
+---
diff --git a/advisories/_posts/2011-11-17-CVE-2011-4319.md b/advisories/_posts/2011-11-17-CVE-2011-4319.md
new file mode 100644
index 00000000..7472fcce
--- /dev/null
+++ b/advisories/_posts/2011-11-17-CVE-2011-4319.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'CVE-2011-4319 (actionpack): XSS vulnerability in the translate helper method
+ in Ruby on Rails'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2011-4319
+ osvdb: 77199
+ url: https://groups.google.com/forum/#!topic/rubyonrails-security/K2HXD7c8fMU
+ title: XSS vulnerability in the translate helper method in Ruby on Rails
+ date: 2011-11-17
+ description: |
+ A cross-site scripting (XSS) flaw was found in the way the 'translate' helper
+ method of the Ruby on Rails performed HTML escaping of interpolated user
+ input, when interpolation in combination with HTML-safe translations were
+ used. A remote attacker could use this flaw to execute arbitrary HTML or web
+ script by providing a specially-crafted input to Ruby on Rails application,
+ using the ActionPack module and its 'translate' helper method without explicit
+ (application specific) sanitization of user provided input.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 3.0.11"
+ - ">= 3.1.2"
+---
diff --git a/advisories/_posts/2011-12-28-CVE-2011-5036.md b/advisories/_posts/2011-12-28-CVE-2011-5036.md
new file mode 100644
index 00000000..2ec8a99a
--- /dev/null
+++ b/advisories/_posts/2011-12-28-CVE-2011-5036.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2011-5036 (rack): CVE-2011-5036 rubygem-rack: hash table collisions DoS
+ (oCERT-2011-003)'
+comments: false
+categories:
+- rack
+advisory:
+ gem: rack
+ cve: 2011-5036
+ osvdb: 78121
+ ghsa: v6j3-7jrw-hq2p
+ url: https://nvd.nist.gov/vuln/detail/CVE-2011-5036
+ title: 'CVE-2011-5036 rubygem-rack: hash table collisions DoS (oCERT-2011-003)'
+ date: 2011-12-28
+ description: |
+ Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes
+ hash values for form parameters without restricting the ability to trigger hash
+ collisions predictably, which allows remote attackers to cause a denial of service
+ (CPU consumption) by sending many crafted parameters.
+ cvss_v2: 5.0
+ patched_versions:
+ - "~> 1.1.3"
+ - "~> 1.2.5"
+ - "~> 1.3.6"
+ - ">= 1.4.0"
+---
diff --git a/advisories/_posts/2012-02-01-CVE-2012-6135.md b/advisories/_posts/2012-02-01-CVE-2012-6135.md
new file mode 100644
index 00000000..1c7d271c
--- /dev/null
+++ b/advisories/_posts/2012-02-01-CVE-2012-6135.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2012-6135 (passenger): Phusion Passenger Gem for Ruby Arbitrary File Deletion'
+comments: false
+categories:
+- passenger
+advisory:
+ gem: passenger
+ cve: 2012-6135
+ osvdb: 90738
+ ghsa: 8mw8-j583-vqfg
+ url: http://old.blog.phusion.nl/2013/03/05/phusion-passenger-4-0-beta-1-and-2-arbitrary-file-deletion-vulnerability/
+ title: Phusion Passenger Gem for Ruby Arbitrary File Deletion
+ date: 2012-02-01
+ description: |
+ Phusion Passenger Gem for Ruby contains a flaw that is triggered during
+ application startup. This issue may allow a local attacker to delete arbitrary files
+ via an application process. If the program has completed the start up process this
+ vulnerability is no longer exploitable.
+ cvss_v2: 2.1
+ cvss_v3: 7.5
+ unaffected_versions:
+ - "< 4.0.0.beta"
+ patched_versions:
+ - ">= 4.0.0"
+---
diff --git a/advisories/_posts/2012-02-29-CVE-2012-6684.md b/advisories/_posts/2012-02-29-CVE-2012-6684.md
new file mode 100644
index 00000000..ac979ed0
--- /dev/null
+++ b/advisories/_posts/2012-02-29-CVE-2012-6684.md
@@ -0,0 +1,34 @@
+---
+layout: advisory
+title: 'CVE-2012-6684 (RedCloth): CVE-2012-6684 rubygem-RedCloth: XSS vulnerability'
+comments: false
+categories:
+- RedCloth
+advisory:
+ gem: RedCloth
+ cve: 2012-6684
+ ghsa: r23g-3qw4-gfh2
+ osvdb: 115941
+ url: https://co3k.org/blog/redcloth-unfixed-xss-en
+ title: 'CVE-2012-6684 rubygem-RedCloth: XSS vulnerability'
+ date: 2012-02-29
+ description: |
+ Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9
+ for Ruby and earlier allows remote attackers to inject arbitrary
+ web script or HTML via a javascript: URI.
+ cvss_v2: 4.3
+ patched_versions:
+ - ">= 4.3.0"
+ related:
+ url:
+ - http://co3k.org/blog/redcloth-unfixed-xss-en
+ - https://gist.github.com/co3k/75b3cb416c342aa1414c
+ - https://github.com/jgarber/redcloth/commit/2f6dab4d6aea5cee778d2f37a135637fe3f1573c
+ - https://github.com/jgarber/redcloth/commit/b24f03db023d1653d60dd33b28e09317cd77c6a0
+ - https://jgarber.lighthouseapp.com/projects/13054-redcloth/tickets/243-xss
+ - https://web.archive.org/web/20150128115714/http://jgarber.lighthouseapp.com/projects/13054-redcloth/tickets/243-xss
+ - https://nvd.nist.gov/vuln/detail/CVE-2012-6684
+ - https://github.com/advisories/GHSA-r23g-3qw4-gfh2
+ - http://seclists.org/fulldisclosure/2014/Dec/50
+ - http://www.debian.org/security/2015/dsa-3168
+---
diff --git a/advisories/_posts/2012-03-01-CVE-2012-1098.md b/advisories/_posts/2012-03-01-CVE-2012-1098.md
new file mode 100644
index 00000000..951ae787
--- /dev/null
+++ b/advisories/_posts/2012-03-01-CVE-2012-1098.md
@@ -0,0 +1,31 @@
+---
+layout: advisory
+title: 'CVE-2012-1098 (activesupport): CVE-2012-1098 rubygem-activesupport: XSS in
+ SafeBuffer#[] (unescaped safe buffers can be marked as safe)'
+comments: false
+categories:
+- activesupport
+- rails
+advisory:
+ gem: activesupport
+ framework: rails
+ cve: 2012-1098
+ osvdb: 79726
+ ghsa: qv8p-v9qw-wc7g
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-1098
+ title: 'CVE-2012-1098 rubygem-activesupport: XSS in SafeBuffer#[] (unescaped safe
+ buffers can be marked as safe)'
+ date: 2012-03-01
+ description: |
+ Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before
+ 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject
+ arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated
+ through certain methods.
+ cvss_v2: 4.3
+ unaffected_versions:
+ - "< 3.0.0"
+ patched_versions:
+ - "~> 3.0.12"
+ - "~> 3.1.4"
+ - ">= 3.2.2"
+---
diff --git a/advisories/_posts/2012-03-01-CVE-2012-1099.md b/advisories/_posts/2012-03-01-CVE-2012-1099.md
new file mode 100644
index 00000000..4ff121c1
--- /dev/null
+++ b/advisories/_posts/2012-03-01-CVE-2012-1099.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2012-1099 (actionpack): CVE-2012-1099 rubygem-actionpack: XSS in the "select"
+ helper'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2012-1099
+ osvdb: 79727
+ ghsa: 2xjj-5x6h-8vmf
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-1099
+ title: 'CVE-2012-1099 rubygem-actionpack: XSS in the "select" helper'
+ date: 2012-03-01
+ description: |
+ Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb
+ in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and
+ 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML
+ via vectors involving certain generation of OPTION elements within SELECT elements.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 3.0.12"
+ - "~> 3.1.4"
+ - ">= 3.2.2"
+---
diff --git a/advisories/_posts/2012-03-14-CVE-2012-2139.md b/advisories/_posts/2012-03-14-CVE-2012-2139.md
new file mode 100644
index 00000000..07f90098
--- /dev/null
+++ b/advisories/_posts/2012-03-14-CVE-2012-2139.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2012-2139 (mail): CVE-2012-2139 rubygem-mail: directory traversal'
+comments: false
+categories:
+- mail
+advisory:
+ gem: mail
+ cve: 2012-2139
+ osvdb: 81631
+ ghsa: cj92-c4fj-w9c5
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-2139
+ title: 'CVE-2012-2139 rubygem-mail: directory traversal'
+ date: 2012-03-14
+ description: |
+ Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb
+ in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary
+ files via a .. (dot dot) in the to parameter.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 2.4.4"
+---
diff --git a/advisories/_posts/2012-03-14-CVE-2012-2140.md b/advisories/_posts/2012-03-14-CVE-2012-2140.md
new file mode 100644
index 00000000..46c71191
--- /dev/null
+++ b/advisories/_posts/2012-03-14-CVE-2012-2140.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2012-2140 (mail): CVE-2012-2140 rubygem-mail: arbitrary command execution
+ when using exim or sendmail from commandline'
+comments: false
+categories:
+- mail
+advisory:
+ gem: mail
+ cve: 2012-2140
+ osvdb: 81632
+ ghsa: rp63-jfmw-532w
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-2140
+ title: 'CVE-2012-2140 rubygem-mail: arbitrary command execution when using exim
+ or sendmail from commandline'
+ date: 2012-03-14
+ description: |
+ The Mail gem before 2.4.3 for Ruby allows remote attackers to execute
+ arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.
+ cvss_v2: 7.5
+ patched_versions:
+ - ">= 2.4.4"
+---
diff --git a/advisories/_posts/2012-04-20-CVE-2012-2126.md b/advisories/_posts/2012-04-20-CVE-2012-2126.md
new file mode 100644
index 00000000..e49b030a
--- /dev/null
+++ b/advisories/_posts/2012-04-20-CVE-2012-2126.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2012-2126 (rubygems-update): CVE-2012-2125 CVE-2012-2126 rubygems: Two
+ security fixes in v1.8.23'
+comments: false
+categories:
+- rubygems-update
+- rubygems
+advisory:
+ gem: rubygems-update
+ library: rubygems
+ cve: 2012-2126
+ osvdb: 81444
+ ghsa: 5mgj-mvv8-46mw
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-2126
+ title: 'CVE-2012-2125 CVE-2012-2126 rubygems: Two security fixes in v1.8.23'
+ date: 2012-04-20
+ description: |
+ RubyGems before 1.8.23 does not verify an SSL certificate, which allows
+ remote attackers to modify a gem during installation via a man-in-the-middle attack.
+ cvss_v2: 4.3
+ patched_versions:
+ - ">= 1.8.23"
+---
diff --git a/advisories/_posts/2012-05-04-CVE-2012-6109.md b/advisories/_posts/2012-05-04-CVE-2012-6109.md
new file mode 100644
index 00000000..6909fa66
--- /dev/null
+++ b/advisories/_posts/2012-05-04-CVE-2012-6109.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2012-6109 (rack): CVE-2012-6109 rubygem-rack: parsing Content-Disposition
+ header DoS'
+comments: false
+categories:
+- rack
+advisory:
+ gem: rack
+ cve: 2012-6109
+ osvdb: 89317
+ ghsa: h77x-m5q8-c29h
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-6109
+ title: 'CVE-2012-6109 rubygem-rack: parsing Content-Disposition header DoS'
+ date: 2012-05-04
+ description: |
+ lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x
+ before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which
+ allows remote attackers to cause a denial of service (infinite loop) via a crafted
+ Content-Disposion header.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 1.1.4"
+ - "~> 1.2.6"
+ - "~> 1.3.7"
+ - ">= 1.4.2"
+---
diff --git a/advisories/_posts/2012-05-11-OSVDB-96396.md b/advisories/_posts/2012-05-11-OSVDB-96396.md
new file mode 100644
index 00000000..bcfbf51d
--- /dev/null
+++ b/advisories/_posts/2012-05-11-OSVDB-96396.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'OSVDB-96396 (activemodel): Don''t allow confirmation to pass if confirmation
+ value is nil and doesn''t match value.'
+comments: false
+categories:
+- activemodel
+- rails
+advisory:
+ gem: activemodel
+ framework: rails
+ osvdb: 96396
+ url: https://github.com/rails/rails/pull/8122
+ title: Don't allow confirmation to pass if confirmation value is nil and doesn't
+ match value.
+ date: 2012-05-11
+ description: |
+ Don't allow confirmation to pass if confirmation value is
+ nil and doesn't match value.
+ notes: Never patched; PR#8122 is closed but not merged
+ related:
+ url:
+ - https://github.com/rails/rails/pull/8122
+ - https://github.com/rails/rails/pull/8122/commits/e8a50aa1c1f9d04c21b54e983f9a090d4b42c8eb
+ - https://github.com/rails/rails/commit/e8a50aa1c1f9d04c21b54e983f9a090d4b42c8eb
+ - https://github.com/rubysec/ruby-advisory-db/issues/178
+---
diff --git a/advisories/_posts/2012-05-29-CVE-2012-1053.md b/advisories/_posts/2012-05-29-CVE-2012-1053.md
new file mode 100644
index 00000000..c825aeae
--- /dev/null
+++ b/advisories/_posts/2012-05-29-CVE-2012-1053.md
@@ -0,0 +1,44 @@
+---
+layout: advisory
+title: 'CVE-2012-1053 (puppet): Puppet Privilege Escallation'
+comments: false
+categories:
+- puppet
+advisory:
+ gem: puppet
+ cve: 2012-1053
+ ghsa: 77hg-g8cc-5r37
+ url: https://web.archive.org/web/20120504011717/http://puppetlabs.com/security/cve/cve-2012-1053
+ title: Puppet Privilege Escallation
+ date: 2012-05-29
+ description: |
+ The change_user method in the SUIDManager (lib/puppet/util/suidmanager.rb)
+ in Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE)
+ Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3 does not properly manage group privileges,
+ which allows local users to gain privileges via vectors related to (1) the change_user
+ not dropping supplementary groups in certain conditions, (2) changes to the eguid
+ without associated changes to the egid, or (3) the addition of the real gid to supplementary
+ groups.
+ cvss_v2: 6.5
+ unaffected_versions:
+ - "< 2.6"
+ patched_versions:
+ - "~> 2.6.14"
+ - ">= 2.7.11"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2012-1053
+ - https://exchange.xforce.ibmcloud.com/vulnerabilities/73445
+ - https://hermes.opensuse.org/messages/15087408
+ - https://github.com/puppetlabs/puppet/commit/76d0749f0a9a496b70e7dc7e6d6d6ff692224e36
+ - https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00003.html
+ - https://ubuntu.com/usn/usn-1372-1
+ - https://web.archive.org/web/20120504011717/http://puppetlabs.com/security/cve/cve-2012-1053
+ - https://web.archive.org/web/20120513215447/http://projects.puppetlabs.com/issues/12458
+ - https://web.archive.org/web/20120513215653/http://projects.puppetlabs.com/issues/12457
+ - https://web.archive.org/web/20120513223437/http://projects.puppetlabs.com/issues/12459
+ - https://web.archive.org/web/20120527071855/http://www.securityfocus.com/bid/52158
+ - https://web.archive.org/web/20120816020421/http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.14
+ - https://www.debian.org/security/2012/dsa-2419
+ - https://github.com/advisories/GHSA-77hg-g8cc-5r37
+---
diff --git a/advisories/_posts/2012-05-29-CVE-2012-1906.md b/advisories/_posts/2012-05-29-CVE-2012-1906.md
new file mode 100644
index 00000000..bb2c4b79
--- /dev/null
+++ b/advisories/_posts/2012-05-29-CVE-2012-1906.md
@@ -0,0 +1,36 @@
+---
+layout: advisory
+title: 'CVE-2012-1906 (puppet): Puppet uses predictable filenames, allowing arbitrary
+ file overwrite'
+comments: false
+categories:
+- puppet
+advisory:
+ gem: puppet
+ cve: 2012-1906
+ ghsa: c4mc-49hq-q275
+ url: https://exchange.xforce.ibmcloud.com/vulnerabilities/74793
+ title: Puppet uses predictable filenames, allowing arbitrary file overwrite
+ date: 2012-05-29
+ description: |
+ Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise
+ (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 uses predictable file
+ names when installing Mac OS X packages from a remote source, which allows local
+ users to overwrite arbitrary files or install arbitrary packages via a symlink attack
+ on a temporary file in /tmp.
+ cvss_v2: 3.3
+ unaffected_versions:
+ - "< 2.6"
+ patched_versions:
+ - "~> 2.6.15"
+ - ">= 2.7.13"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2012-1906
+ - https://exchange.xforce.ibmcloud.com/vulnerabilities/74793
+ - https://github.com/puppetlabs/puppet/commit/f7829ec1f1b2c3def8e0eda09c22c3c1fed3a27f
+ - https://ubuntu.com/usn/usn-1419-1
+ - https://web.archive.org/web/20120415105345/http://www.securityfocus.com/bid/52975
+ - https://www.debian.org/security/2012/dsa-2451
+ - https://github.com/advisories/GHSA-c4mc-49hq-q275
+---
diff --git a/advisories/_posts/2012-05-31-CVE-2012-2660.md b/advisories/_posts/2012-05-31-CVE-2012-2660.md
new file mode 100644
index 00000000..fbba268e
--- /dev/null
+++ b/advisories/_posts/2012-05-31-CVE-2012-2660.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'CVE-2012-2660 (activerecord): CVE-2012-2660 rubygem-actionpack: Unsafe query
+ generation'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2012-2660
+ osvdb: 82610
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-2660
+ title: 'CVE-2012-2660 rubygem-actionpack: Unsafe query generation'
+ date: 2012-05-31
+ description: |
+ actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before
+ 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences
+ in parameter handling between the Active Record component and the Rack interface,
+ which allows remote attackers to bypass intended database-query restrictions and
+ perform NULL checks via a crafted request, as demonstrated by certain "[nil]" values,
+ a related issue to CVE-2012-2694.
+ cvss_v2: 7.5
+ patched_versions:
+ - "~> 3.0.13"
+ - "~> 3.1.5"
+ - ">= 3.2.4"
+---
diff --git a/advisories/_posts/2012-05-31-CVE-2012-2661.md b/advisories/_posts/2012-05-31-CVE-2012-2661.md
new file mode 100644
index 00000000..73cf139b
--- /dev/null
+++ b/advisories/_posts/2012-05-31-CVE-2012-2661.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2012-2661 (activerecord): CVE-2012-2661 rubygem-activerecord: SQL injection
+ when processing nested query paramaters'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2012-2661
+ osvdb: 82403
+ ghsa: fh39-v733-mxfr
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-2661
+ title: 'CVE-2012-2661 rubygem-activerecord: SQL injection when processing nested
+ query paramaters'
+ date: 2012-05-31
+ description: |
+ The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x
+ before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of
+ request data to a where method in an ActiveRecord class, which allows remote attackers
+ to conduct certain SQL injection attacks via nested query parameters that leverage
+ unintended recursion, a related issue to CVE-2012-2695.
+ cvss_v2: 5.0
+ unaffected_versions:
+ - "~> 2.3.14"
+ patched_versions:
+ - "~> 3.0.13"
+ - "~> 3.1.5"
+ - ">= 3.2.4"
+---
diff --git a/advisories/_posts/2012-06-06-CVE-2012-2671.md b/advisories/_posts/2012-06-06-CVE-2012-2671.md
new file mode 100644
index 00000000..90421f01
--- /dev/null
+++ b/advisories/_posts/2012-06-06-CVE-2012-2671.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2012-2671 (rack-cache): rack-cache Rubygem Sensitive HTTP Header Caching
+ Weakness'
+comments: false
+categories:
+- rack-cache
+advisory:
+ gem: rack-cache
+ cve: 2012-2671
+ osvdb: 83077
+ ghsa: hrp6-w4v2-8737
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-2671
+ title: rack-cache Rubygem Sensitive HTTP Header Caching Weakness
+ date: 2012-06-06
+ description: |
+ Rack::Cache (rack-cache) contains a flaw related to the rubygem caching
+ sensitive HTTP headers. This will result in a weakness that may make it
+ easier for an attacker to gain access to a user's session via a specially
+ crafted header.
+ cvss_v2: 7.5
+ patched_versions:
+ - ">= 1.2"
+---
diff --git a/advisories/_posts/2012-06-08-CVE-2012-6685.md b/advisories/_posts/2012-06-08-CVE-2012-6685.md
new file mode 100644
index 00000000..743058e2
--- /dev/null
+++ b/advisories/_posts/2012-06-08-CVE-2012-6685.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2012-6685 (nokogiri): CVE-2012-6685 rubygem-nokogiri: XML eXternal Entity
+ (XXE) flaw'
+comments: false
+categories:
+- nokogiri
+advisory:
+ gem: nokogiri
+ cve: 2012-6685
+ osvdb: 90946
+ ghsa: 6wj9-77wq-jq7p
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-6685
+ title: 'CVE-2012-6685 rubygem-nokogiri: XML eXternal Entity (XXE) flaw'
+ date: 2012-06-08
+ description: 'Nokogiri before 1.5.4 is vulnerable to XXE attacks
+
+ '
+ cvss_v2: 5.0
+ cvss_v3: 7.5
+ patched_versions:
+ - ">= 1.5.4"
+---
diff --git a/advisories/_posts/2012-07-02-OSVDB-125712.md b/advisories/_posts/2012-07-02-OSVDB-125712.md
new file mode 100644
index 00000000..eb59c787
--- /dev/null
+++ b/advisories/_posts/2012-07-02-OSVDB-125712.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'OSVDB-125712 (spree): Product Scopes could allow for unauthenticated remote
+ command execution'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ osvdb: 125712
+ url: https://web.archive.org/web/20121126005814/https://spreecommerce.com/blog/security-issue-all-versions
+ title: Product Scopes could allow for unauthenticated remote command execution
+ date: 2012-07-02
+ description: |
+ Product Scopes could allow for unauthenticated remote command execution.
+ This was corrected by removing conditions_any scope and use ARel query
+ building instead.
+ patched_versions:
+ - "~> 0.11.4"
+ - "~> 0.70.6"
+ - "~> 1.0.5"
+ - ">= 1.1.2"
+ related:
+ url:
+ - https://web.archive.org/web/20121126005814/https://spreecommerce.com/blog/security-issue-all-versions
+ - https://security.snyk.io/vuln/SNYK-RUBY-SPREE-20034
+---
diff --git a/advisories/_posts/2012-07-02-OSVDB-125713.md b/advisories/_posts/2012-07-02-OSVDB-125713.md
new file mode 100644
index 00000000..602ef0d4
--- /dev/null
+++ b/advisories/_posts/2012-07-02-OSVDB-125713.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'OSVDB-125713 (spree): Potential XSS vulnerability related to the analytics
+ dashboard'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ osvdb: 125713
+ url: https://web.archive.org/web/20121126005814/https://spreecommerce.com/blog/security-issue-all-versions
+ title: Potential XSS vulnerability related to the analytics dashboard
+ date: 2012-07-02
+ description: |
+ Spree has a flaw in its analytics dashboard where
+ keywords are not escaped, leading to potential XSS.
+ patched_versions:
+ - "~> 0.11.4"
+ - "~> 0.70.6"
+ - "~> 1.0.5"
+ - ">= 1.1.2"
+ related:
+ url:
+ - https://web.archive.org/web/20121126005814/https://spreecommerce.com/blog/security-issue-all-versions
+---
diff --git a/advisories/_posts/2012-07-26-CVE-2012-3424.md b/advisories/_posts/2012-07-26-CVE-2012-3424.md
new file mode 100644
index 00000000..2de76573
--- /dev/null
+++ b/advisories/_posts/2012-07-26-CVE-2012-3424.md
@@ -0,0 +1,31 @@
+---
+layout: advisory
+title: 'CVE-2012-3424 (actionpack): CVE-2012-3424 rubygem-actionpack: DoS vulnerability
+ in authenticate_or_request_with_http_digest'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2012-3424
+ osvdb: 84243
+ ghsa: 92w9-2pqw-rhjj
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-3424
+ title: 'CVE-2012-3424 rubygem-actionpack: DoS vulnerability in authenticate_or_request_with_http_digest'
+ date: 2012-07-26
+ description: |
+ The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb
+ in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts
+ Digest Authentication strings to symbols, which allows remote attackers to cause
+ a denial of service by leveraging access to an application that uses a with_http_digest
+ helper method, as demonstrated by the authenticate_or_request_with_http_digest method.
+ cvss_v2: 5.0
+ unaffected_versions:
+ - ">= 2.3.5, <= 2.3.14"
+ patched_versions:
+ - "~> 3.0.16"
+ - "~> 3.1.7"
+ - ">= 3.2.7"
+---
diff --git a/advisories/_posts/2012-08-08-CVE-2010-5142.md b/advisories/_posts/2012-08-08-CVE-2010-5142.md
new file mode 100644
index 00000000..ab123a42
--- /dev/null
+++ b/advisories/_posts/2012-08-08-CVE-2010-5142.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'CVE-2010-5142 (chef): Chef Improper Access Control Vulnerability'
+comments: false
+categories:
+- chef
+advisory:
+ gem: chef
+ cve: 2010-5142
+ ghsa: f68m-q26r-64f6
+ url: https://github.com/advisories/GHSA-f68m-q26r-64f6
+ title: Chef Improper Access Control Vulnerability
+ date: 2012-08-08
+ description: |
+ `chef-server-api/app/controllers/users.rb` in the API in Chef before
+ 0.9.0 does not require administrative privileges for the create,
+ destroy, and update methods, which allows remote authenticated
+ users to manage user accounts via requests to the /users URI.
+ cvss_v2: 6.5
+ patched_versions:
+ - ">= 0.9.0"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2010-5142
+ - https://vuldb.com/?id.61514
+ - http://tickets.opscode.com/browse/CHEF-1289
+ - https://github.com/opscode/chef/commit/c3bb41f727fbe00e5de719d687757b24c8dcdfc8
+ - https://github.com/advisories/GHSA-f68m-q26r-64f6
+---
diff --git a/advisories/_posts/2012-08-09-CVE-2012-3463.md b/advisories/_posts/2012-08-09-CVE-2012-3463.md
new file mode 100644
index 00000000..2fcaa7a5
--- /dev/null
+++ b/advisories/_posts/2012-08-09-CVE-2012-3463.md
@@ -0,0 +1,31 @@
+---
+layout: advisory
+title: 'CVE-2012-3463 (actionpack): CVE-2012-3463 rubygem-actionpack: potential XSS
+ vulnerability in select_tag prompt'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2012-3463
+ osvdb: 84515
+ ghsa: 98mf-8f57-64qf
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-3463
+ title: 'CVE-2012-3463 rubygem-actionpack: potential XSS vulnerability in select_tag
+ prompt'
+ date: 2012-08-09
+ description: |
+ Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb
+ in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows
+ remote attackers to inject arbitrary web script or HTML via the prompt field to
+ the select_tag helper.
+ cvss_v2: 4.3
+ unaffected_versions:
+ - "~> 2.3.0"
+ patched_versions:
+ - "~> 3.0.17"
+ - "~> 3.1.8"
+ - ">= 3.2.8"
+---
diff --git a/advisories/_posts/2012-08-09-CVE-2012-3464.md b/advisories/_posts/2012-08-09-CVE-2012-3464.md
new file mode 100644
index 00000000..846d1fd4
--- /dev/null
+++ b/advisories/_posts/2012-08-09-CVE-2012-3464.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2012-3464 (activesupport): CVE-2012-3464 rubygem-actionpack: potential
+ XSS vulnerability'
+comments: false
+categories:
+- activesupport
+- rails
+advisory:
+ gem: activesupport
+ framework: rails
+ cve: 2012-3464
+ osvdb: 84516
+ ghsa: h835-75hw-pj89
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-3464
+ title: 'CVE-2012-3464 rubygem-actionpack: potential XSS vulnerability'
+ date: 2012-08-09
+ description: |
+ Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb
+ in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might
+ allow remote attackers to inject arbitrary web script or HTML via vectors involving
+ a ' (quote) character.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 3.0.17"
+ - "~> 3.1.8"
+ - ">= 3.2.8"
+---
diff --git a/advisories/_posts/2012-08-09-CVE-2012-3465.md b/advisories/_posts/2012-08-09-CVE-2012-3465.md
new file mode 100644
index 00000000..804174e8
--- /dev/null
+++ b/advisories/_posts/2012-08-09-CVE-2012-3465.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2012-3465 (actionpack): CVE-2012-3465 rubygem-actionpack: XSS Vulnerability
+ in strip_tags'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2012-3465
+ osvdb: 84513
+ ghsa: 7g65-ghrg-hpf5
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-3465
+ title: 'CVE-2012-3465 rubygem-actionpack: XSS Vulnerability in strip_tags'
+ date: 2012-08-09
+ description: |
+ Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb
+ in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and
+ 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML
+ via malformed HTML markup.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 3.0.17"
+ - "~> 3.1.8"
+ - ">= 3.2.8"
+---
diff --git a/advisories/_posts/2012-09-08-CVE-2012-6134.md b/advisories/_posts/2012-09-08-CVE-2012-6134.md
new file mode 100644
index 00000000..6f7eba59
--- /dev/null
+++ b/advisories/_posts/2012-09-08-CVE-2012-6134.md
@@ -0,0 +1,21 @@
+---
+layout: advisory
+title: 'CVE-2012-6134 (omniauth-oauth2): Ruby on Rails omniauth-oauth2 Gem CSRF vulnerability'
+comments: false
+categories:
+- omniauth-oauth2
+advisory:
+ gem: omniauth-oauth2
+ cve: 2012-6134
+ osvdb: 90264
+ ghsa: fgmx-8h93-26fh
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-6134
+ title: Ruby on Rails omniauth-oauth2 Gem CSRF vulnerability
+ date: 2012-09-08
+ description: |
+ The omniauth-oauth2 Ruby Gem contains a flaw that allows an attacker to
+ inject values into a user's session through a CSRF attack.
+ cvss_v2: 6.8
+ patched_versions:
+ - ">= 1.1.1"
+---
diff --git a/advisories/_posts/2012-09-08-OSVDB-90945.md b/advisories/_posts/2012-09-08-OSVDB-90945.md
new file mode 100644
index 00000000..cd7f6427
--- /dev/null
+++ b/advisories/_posts/2012-09-08-OSVDB-90945.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'OSVDB-90945 (loofah): Loofah HTML and XSS injection vulnerability'
+comments: false
+categories:
+- loofah
+advisory:
+ gem: loofah
+ osvdb: 90945
+ url: https://security.snyk.io/vuln/SNYK-RUBY-LOOFAH-20039
+ title: Loofah HTML and XSS injection vulnerability
+ date: 2012-09-08
+ description: |
+ Loofah Gem for Ruby contains a flaw that allows a remote cross-site
+ scripting (XSS) attack. This flaw exists because the
+ Loofah::HTML::Document\#text function passes properly sanitized
+ user-supplied input to the Loofah::XssFoliate and
+ Loofah::Helpers\#strip_tags functions which convert input back to
+ text. This may allow an attacker to create a specially crafted
+ request that would execute arbitrary script code in a user's browser
+ within the trust relationship between their browser and the server.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 0.4.6"
+ related:
+ url:
+ - https://github.com/flavorjones/loofah/compare/v0.4.5...v0.4.6
+ - https://security.snyk.io/vuln/SNYK-RUBY-LOOFAH-20039
+ - https://www.versioneye.com/Ruby/loofah/0.4.2
+ - https://www.mend.io/vulnerability-database/WS-2012-0023
+ - http://www.osvdb.org/show/osvdb/90945
+---
diff --git a/advisories/_posts/2012-09-25-CVE-2012-2125.md b/advisories/_posts/2012-09-25-CVE-2012-2125.md
new file mode 100644
index 00000000..733853ef
--- /dev/null
+++ b/advisories/_posts/2012-09-25-CVE-2012-2125.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2012-2125 (rubygems-update): CVE-2012-2125 CVE-2012-2126 rubygems: Two
+ security fixes in v1.8.23'
+comments: false
+categories:
+- rubygems-update
+- rubygems
+advisory:
+ gem: rubygems-update
+ library: rubygems
+ cve: 2012-2125
+ osvdb: 85809
+ ghsa: 228f-g3h7-3fj3
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-2125
+ title: 'CVE-2012-2125 CVE-2012-2126 rubygems: Two security fixes in v1.8.23'
+ date: 2012-09-25
+ description: |
+ RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which
+ makes it easier for remote attackers to observe or modify a gem during
+ installation via a man-in-the-middle attack.
+ cvss_v2: 5.8
+ patched_versions:
+ - ">= 1.8.23"
+---
diff --git a/advisories/_posts/2012-12-04-CVE-2012-5604.md b/advisories/_posts/2012-12-04-CVE-2012-5604.md
new file mode 100644
index 00000000..7ebdfeac
--- /dev/null
+++ b/advisories/_posts/2012-12-04-CVE-2012-5604.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2012-5604 (ldap_fluff): CVE-2012-5604 rubygem-ldap_fluff: CloudForms authentication
+ bypass when handling anonymous LDAP bind'
+comments: false
+categories:
+- ldap_fluff
+advisory:
+ gem: ldap_fluff
+ cve: 2012-5604
+ osvdb: 90579
+ ghsa: 9whh-582r-589h
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-5604
+ title: 'CVE-2012-5604 rubygem-ldap_fluff: CloudForms authentication bypass when
+ handling anonymous LDAP bind'
+ date: 2012-12-04
+ description: |
+ The ldap_fluff gem for Ruby, as used in Red Hat CloudForms 1.1, when
+ using Active Directory for authentication, allows remote attackers to bypass authentication
+ via unspecified vectors.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 0.1.3"
+---
diff --git a/advisories/_posts/2012-12-06-CVE-2013-0284.md b/advisories/_posts/2012-12-06-CVE-2013-0284.md
new file mode 100644
index 00000000..68538139
--- /dev/null
+++ b/advisories/_posts/2012-12-06-CVE-2013-0284.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-0284 (newrelic_rpm): Ruby on Rails newrelic_rpm Gem Discloses Sensitive
+ Information'
+comments: false
+categories:
+- newrelic_rpm
+advisory:
+ gem: newrelic_rpm
+ cve: 2013-0284
+ osvdb: 90189
+ ghsa: q6cw-2553-7837
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0284
+ title: Ruby on Rails newrelic_rpm Gem Discloses Sensitive Information
+ date: 2012-12-06
+ description: |
+ A bug in the Ruby agent causes database connection information and raw SQL
+ statements to be transmitted to New Relic servers. The database connection
+ information includes the database IP address, username, and password
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 3.5.3.25"
+---
diff --git a/advisories/_posts/2012-12-21-CVE-2012-6497.md b/advisories/_posts/2012-12-21-CVE-2012-6497.md
new file mode 100644
index 00000000..ef018048
--- /dev/null
+++ b/advisories/_posts/2012-12-21-CVE-2012-6497.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2012-6497 (authlogic): Ruby on Rails Authlogic Gem secret_token.rb Known
+ secret_token Value Weakness'
+comments: false
+categories:
+- authlogic
+advisory:
+ gem: authlogic
+ cve: 2012-6497
+ osvdb: 89064
+ ghsa: rx7j-mw4c-76g9
+ url: https://nvd.nist.gov/vuln/detail/CVE-2012-6497
+ title: Ruby on Rails Authlogic Gem secret_token.rb Known secret_token Value Weakness
+ date: 2012-12-21
+ description: |
+ Ruby on Rails contains a flaw in the Authlogic gem. The issue is triggered
+ when the program makes an unsafe method call for find_by_id. With a specially
+ crafted parameter in an environment that knows the secret_token value in
+ secret_token.rb, a remote attacker to more easily conduct SQL injection
+ attacks.
+ patched_versions:
+ - ">= 3.3.0"
+---
diff --git a/advisories/_posts/2012-12-22-CVE-2012-6496.md b/advisories/_posts/2012-12-22-CVE-2012-6496.md
new file mode 100644
index 00000000..c4ab0d55
--- /dev/null
+++ b/advisories/_posts/2012-12-22-CVE-2012-6496.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2012-6496 (activerecord): Ruby on Rails find_by_* Methods Authlogic SQL
+ Injection Bypass'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2012-6496
+ osvdb: 88661
+ ghsa: gh2w-j7cx-2664
+ url: https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/DCNTNp_qjFM
+ title: Ruby on Rails find_by_* Methods Authlogic SQL Injection Bypass
+ date: 2012-12-22
+ description: |
+ Due to the way dynamic finders in Active Record extract options from method
+ parameters, a method parameter can mistakenly be used as a scope. Carefully
+ crafted requests can use the scope to inject arbitrary SQL.
+ cvss_v2: 6.4
+ patched_versions:
+ - "~> 3.0.18"
+ - "~> 3.1.9"
+ - ">= 3.2.10"
+---
diff --git a/advisories/_posts/2013-01-07-CVE-2013-0183.md b/advisories/_posts/2013-01-07-CVE-2013-0183.md
new file mode 100644
index 00000000..580d306b
--- /dev/null
+++ b/advisories/_posts/2013-01-07-CVE-2013-0183.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-0183 (rack): CVE-2013-0183 rubygem-rack: receiving excessively long
+ lines triggers out-of-memory error'
+comments: false
+categories:
+- rack
+advisory:
+ gem: rack
+ cve: 2013-0183
+ osvdb: 89320
+ ghsa: 3pxh-h8hw-mj8w
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0183
+ title: 'CVE-2013-0183 rubygem-rack: receiving excessively long lines triggers out-of-memory
+ error'
+ date: 2013-01-07
+ description: |
+ multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3
+ allows remote attackers to cause a denial of service (memory consumption and out-of-memory
+ error) via a long string in a Multipart HTTP packet.
+ cvss_v2: 5.0
+ patched_versions:
+ - "~> 1.3.8"
+ - ">= 1.4.3"
+---
diff --git a/advisories/_posts/2013-01-08-CVE-2013-0155.md b/advisories/_posts/2013-01-08-CVE-2013-0155.md
new file mode 100644
index 00000000..6bb5c252
--- /dev/null
+++ b/advisories/_posts/2013-01-08-CVE-2013-0155.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2013-0155 (activerecord): CVE-2013-0155 rubygem-actionpack, rubygem-activerecord:
+ Unsafe Query Generation Risk in Ruby on Rails'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2013-0155
+ osvdb: 89025
+ ghsa: gppp-5xc5-wfpx
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0155
+ title: 'CVE-2013-0155 rubygem-actionpack, rubygem-activerecord: Unsafe Query Generation
+ Risk in Ruby on Rails'
+ date: 2013-01-08
+ description: |
+ Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before
+ 3.2.11 does not properly consider differences in parameter handling between the
+ Active Record component and the JSON implementation, which allows remote attackers
+ to bypass intended database-query restrictions and perform NULL checks or trigger
+ missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]"
+ values, a related issue to CVE-2012-2660 and CVE-2012-2694.
+ cvss_v2: 10.0
+ patched_versions:
+ - "~> 2.3.16"
+ - "~> 3.0.19"
+ - "~> 3.1.10"
+ - ">= 3.2.11"
+---
diff --git a/advisories/_posts/2013-01-08-CVE-2013-0156.md b/advisories/_posts/2013-01-08-CVE-2013-0156.md
new file mode 100644
index 00000000..44b9c004
--- /dev/null
+++ b/advisories/_posts/2013-01-08-CVE-2013-0156.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2013-0156 (actionpack): CVE-2013-0156 rubygem-activesupport: Multiple
+ vulnerabilities in parameter parsing in ActionPack'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2013-0156
+ osvdb: 89026
+ ghsa: jmgw-6vjg-jjwg
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0156
+ title: 'CVE-2013-0156 rubygem-activesupport: Multiple vulnerabilities in parameter
+ parsing in ActionPack'
+ date: 2013-01-08
+ description: |
+ active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15,
+ 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly
+ restrict casts of string values, which allows remote attackers to conduct object-injection
+ attacks and execute arbitrary code, or cause a denial of service (memory and CPU
+ consumption) involving nested XML entity references, by leveraging Action Pack support
+ for (1) YAML type conversion or (2) Symbol type conversion.
+ cvss_v2: 10.0
+ patched_versions:
+ - "~> 2.3.15"
+ - "~> 3.0.19"
+ - "~> 3.1.10"
+ - ">= 3.2.11"
+---
diff --git a/advisories/_posts/2013-01-08-CVE-2013-1802.md b/advisories/_posts/2013-01-08-CVE-2013-1802.md
new file mode 100644
index 00000000..f5166b32
--- /dev/null
+++ b/advisories/_posts/2013-01-08-CVE-2013-1802.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-1802 (extlib): extlib Gem for Ruby Type Casting Parameter Parsing
+ Remote Code Execution'
+comments: false
+categories:
+- extlib
+advisory:
+ gem: extlib
+ cve: 2013-1802
+ osvdb: 90740
+ ghsa: 9h36-4jf2-hx53
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1802
+ title: extlib Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
+ date: 2013-01-08
+ description: |
+ extlib Gem for Ruby contains a flaw that is triggered when a type casting
+ error occurs during the parsing of parameters. This may allow a
+ context-dependent attacker to potentially execute arbitrary code.
+ cvss_v2: 9.3
+ patched_versions:
+ - ">= 0.9.16"
+---
diff --git a/advisories/_posts/2013-01-09-CVE-2013-1800.md b/advisories/_posts/2013-01-09-CVE-2013-1800.md
new file mode 100644
index 00000000..01fc749c
--- /dev/null
+++ b/advisories/_posts/2013-01-09-CVE-2013-1800.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-1800 (crack): CVE-2013-1800 rubygem-crack: YAML parameter parsing
+ vulnerability'
+comments: false
+categories:
+- crack
+advisory:
+ gem: crack
+ cve: 2013-1800
+ osvdb: 90742
+ ghsa: m7fq-cf8q-35q7
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1800
+ title: 'CVE-2013-1800 rubygem-crack: YAML parameter parsing vulnerability'
+ date: 2013-01-09
+ description: |
+ The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts
+ of string values, which might allow remote attackers to conduct object-injection
+ attacks and execute arbitrary code, or cause a denial of service (memory and CPU
+ consumption) by leveraging Action Pack support for (1) YAML type conversion or (2)
+ Symbol type conversion, a similar vulnerability to CVE-2013-0156.
+ cvss_v2: 7.5
+ patched_versions:
+ - ">= 0.3.2"
+---
diff --git a/advisories/_posts/2013-01-10-CVE-2013-0285.md b/advisories/_posts/2013-01-10-CVE-2013-0285.md
new file mode 100644
index 00000000..dc72a6ab
--- /dev/null
+++ b/advisories/_posts/2013-01-10-CVE-2013-0285.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2013-0285 (nori): Ruby Gem nori Parameter Parsing Remote Code Execution'
+comments: false
+categories:
+- nori
+advisory:
+ gem: nori
+ cve: 2013-0285
+ osvdb: 90196
+ ghsa: 4936-rj25-6wm6
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0285
+ title: Ruby Gem nori Parameter Parsing Remote Code Execution
+ date: 2013-01-10
+ description: |
+ The Ruby Gem nori has a parameter parsing error that may allow an attacker
+ to execute arbitrary code. This vulnerability has to do with type casting
+ during parsing, and is related to CVE-2013-0156.
+ cvss_v2: 7.5
+ patched_versions:
+ - "~> 1.0.3"
+ - "~> 1.1.4"
+ - ">= 2.0.2"
+---
diff --git a/advisories/_posts/2013-01-11-CVE-2013-0175.md b/advisories/_posts/2013-01-11-CVE-2013-0175.md
new file mode 100644
index 00000000..1c81a2c1
--- /dev/null
+++ b/advisories/_posts/2013-01-11-CVE-2013-0175.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-0175 (multi_xml): multi_xml Gem for Ruby XML Parameter Parsing Remote
+ Command Execution'
+comments: false
+categories:
+- multi_xml
+advisory:
+ gem: multi_xml
+ cve: 2013-0175
+ osvdb: 89148
+ ghsa: pchc-949f-53m5
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0175
+ title: multi_xml Gem for Ruby XML Parameter Parsing Remote Command Execution
+ date: 2013-01-11
+ description: |
+ The multi_xml Gem for Ruby contains a flaw that is triggered when an error
+ occurs during the parsing of the 'XML' parameter. With a crafted request
+ containing arbitrary symbol and yaml types, a remote attacker can execute
+ arbitrary commands.
+ patched_versions:
+ - ">= 0.5.2"
+---
diff --git a/advisories/_posts/2013-01-13-CVE-2013-0184.md b/advisories/_posts/2013-01-13-CVE-2013-0184.md
new file mode 100644
index 00000000..1ca92db5
--- /dev/null
+++ b/advisories/_posts/2013-01-13-CVE-2013-0184.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2013-0184 (rack): CVE-2013-0184 rubygem-rack: Rack::Auth::AbstractRequest
+ DoS'
+comments: false
+categories:
+- rack
+advisory:
+ gem: rack
+ cve: 2013-0184
+ osvdb: 89327
+ ghsa: v882-ccj6-jc48
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0184
+ title: 'CVE-2013-0184 rubygem-rack: Rack::Auth::AbstractRequest DoS'
+ date: 2013-01-13
+ description: |
+ Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x
+ before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows
+ remote attackers to cause a denial of service via unknown vectors related to "symbolized
+ arbitrary strings."
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 1.1.5"
+ - "~> 1.2.7"
+ - "~> 1.3.9"
+ - ">= 1.4.4"
+---
diff --git a/advisories/_posts/2013-01-14-CVE-2013-1801.md b/advisories/_posts/2013-01-14-CVE-2013-1801.md
new file mode 100644
index 00000000..75803529
--- /dev/null
+++ b/advisories/_posts/2013-01-14-CVE-2013-1801.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-1801 (httparty): httparty Gem for Ruby Type Casting Parameter Parsing
+ Remote Code Execution'
+comments: false
+categories:
+- httparty
+advisory:
+ gem: httparty
+ cve: 2013-1801
+ osvdb: 90741
+ ghsa: mgx3-27hr-mfgp
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1801
+ title: httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution
+ date: 2013-01-14
+ description: |
+ httparty Gem for Ruby contains a flaw that is triggered when a type casting
+ error occurs during the parsing of parameters. This may allow a
+ context-dependent attacker to potentially execute arbitrary code.
+ cvss_v2: 7.5
+ patched_versions:
+ - ">= 0.10.0"
+---
diff --git a/advisories/_posts/2013-01-28-CVE-2013-0233.md b/advisories/_posts/2013-01-28-CVE-2013-0233.md
new file mode 100644
index 00000000..ed16fd35
--- /dev/null
+++ b/advisories/_posts/2013-01-28-CVE-2013-0233.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2013-0233 (devise): Devise Database Type Conversion Crafted Request Parsing
+ Security Bypass'
+comments: false
+categories:
+- devise
+advisory:
+ gem: devise
+ cve: 2013-0233
+ osvdb: 89642
+ ghsa: jxhw-mg8m-2pj8
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0233
+ title: Devise Database Type Conversion Crafted Request Parsing Security Bypass
+ date: 2013-01-28
+ description: |
+ Devise contains a flaw that is triggered during when a type conversion error
+ occurs during the parsing of a malformed request. With a specially crafted
+ request, a remote attacker can bypass security restrictions.
+ cvss_v2: 6.8
+ patched_versions:
+ - "~> 1.5.4"
+ - "~> 2.0.5"
+ - "~> 2.1.3"
+ - ">= 2.2.3"
+---
diff --git a/advisories/_posts/2013-01-28-CVE-2013-0333.md b/advisories/_posts/2013-01-28-CVE-2013-0333.md
new file mode 100644
index 00000000..7f52edd3
--- /dev/null
+++ b/advisories/_posts/2013-01-28-CVE-2013-0333.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-0333 (activesupport): CVE-2013-0333 rubygem-activesupport: json to
+ yaml parsing'
+comments: false
+categories:
+- activesupport
+- rails
+advisory:
+ gem: activesupport
+ framework: rails
+ cve: 2013-0333
+ osvdb: 89594
+ ghsa: xgr2-v94m-rc9g
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0333
+ title: 'CVE-2013-0333 rubygem-activesupport: json to yaml parsing'
+ date: 2013-01-28
+ description: |
+ lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before
+ 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data
+ for processing by a YAML parser, which allows remote attackers to execute arbitrary
+ code, conduct SQL injection attacks, or bypass authentication via crafted data that
+ triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
+ cvss_v2: 9.3
+ patched_versions:
+ - "~> 2.3.16"
+ - ">= 3.0.20"
+---
diff --git a/advisories/_posts/2013-02-06-CVE-2013-0256.md b/advisories/_posts/2013-02-06-CVE-2013-0256.md
new file mode 100644
index 00000000..fff930cb
--- /dev/null
+++ b/advisories/_posts/2013-02-06-CVE-2013-0256.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2013-0256 (rdoc): CVE-2013-0256 rubygem-rdoc: Cross-site scripting in
+ the documentation created by Darkfish Rdoc HTML generator / template'
+comments: false
+categories:
+- rdoc
+advisory:
+ gem: rdoc
+ cve: 2013-0256
+ osvdb: 90004
+ ghsa: v2r9-c84j-v7xm
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0256
+ title: 'CVE-2013-0256 rubygem-rdoc: Cross-site scripting in the documentation created
+ by Darkfish Rdoc HTML generator / template'
+ date: 2013-02-06
+ description: |
+ darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1,
+ as used in Ruby, does not properly generate documents, which allows remote attackers
+ to conduct cross-site scripting (XSS) attacks via a crafted URL.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 3.9.5"
+ - "~> 3.12.1"
+ - ">= 4.0"
+---
diff --git a/advisories/_posts/2013-02-07-CVE-2013-0262.md b/advisories/_posts/2013-02-07-CVE-2013-0262.md
new file mode 100644
index 00000000..c778982d
--- /dev/null
+++ b/advisories/_posts/2013-02-07-CVE-2013-0262.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-0262 (rack): CVE-2013-0262 rubygem-rack: Path sanitization information
+ disclosure'
+comments: false
+categories:
+- rack
+advisory:
+ gem: rack
+ cve: 2013-0262
+ osvdb: 89938
+ ghsa: 85r7-w5mv-c849
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0262
+ title: 'CVE-2013-0262 rubygem-rack: Path sanitization information disclosure'
+ date: 2013-02-07
+ description: |
+ rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before
+ 1.4.5 allows attackers to access arbitrary files outside the intended root directory
+ via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability
+ that is remotely exploitable, aka "symlink path traversals."
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 1.4.5"
+ - ">= 1.5.2"
+---
diff --git a/advisories/_posts/2013-02-07-CVE-2013-0263.md b/advisories/_posts/2013-02-07-CVE-2013-0263.md
new file mode 100644
index 00000000..fb4f1ab6
--- /dev/null
+++ b/advisories/_posts/2013-02-07-CVE-2013-0263.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-0263 (rack): CVE-2013-0263 rubygem-rack: Timing attack in cookie
+ sessions'
+comments: false
+categories:
+- rack
+advisory:
+ gem: rack
+ cve: 2013-0263
+ osvdb: 89939
+ ghsa: xc85-32mf-xpv8
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0263
+ title: 'CVE-2013-0263 rubygem-rack: Timing attack in cookie sessions'
+ date: 2013-02-07
+ description: |
+ Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5,
+ 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers
+ to guess the session cookie, gain privileges, and execute arbitrary code via a timing
+ attack involving an HMAC comparison function that does not run in constant time.
+ cvss_v2: 5.1
+ patched_versions:
+ - "~> 1.1.6"
+ - "~> 1.2.8"
+ - "~> 1.3.10"
+ - "~> 1.4.5"
+ - ">= 1.5.2"
+---
diff --git a/advisories/_posts/2013-02-11-CVE-2013-0276.md b/advisories/_posts/2013-02-11-CVE-2013-0276.md
new file mode 100644
index 00000000..f44a87bb
--- /dev/null
+++ b/advisories/_posts/2013-02-11-CVE-2013-0276.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-0276 (activerecord): CVE-2013-0276 rubygem-activerecord/rubygem-activemodel:
+ circumvention of attr_protected'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2013-0276
+ osvdb: 90072
+ ghsa: gr44-7grc-37vq
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0276
+ title: 'CVE-2013-0276 rubygem-activerecord/rubygem-activemodel: circumvention of
+ attr_protected'
+ date: 2013-02-11
+ description: |
+ ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and
+ 3.2.x before 3.2.12 allows remote attackers to bypass the attr_protected protection
+ mechanism and modify protected model attributes via a crafted request.
+ cvss_v2: 5.0
+ patched_versions:
+ - "~> 2.3.17"
+ - "~> 3.1.11"
+ - ">= 3.2.12"
+---
diff --git a/advisories/_posts/2013-02-11-CVE-2013-0277.md b/advisories/_posts/2013-02-11-CVE-2013-0277.md
new file mode 100644
index 00000000..6cf7d6a5
--- /dev/null
+++ b/advisories/_posts/2013-02-11-CVE-2013-0277.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-0277 (activerecord): CVE-2013-0277 rubygem-activerecord: Serialized
+ Attributes YAML Vulnerability with Rails 2.3 and 3.0'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2013-0277
+ osvdb: 90073
+ ghsa: fhj9-cjjh-27vm
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0277
+ title: 'CVE-2013-0277 rubygem-activerecord: Serialized Attributes YAML Vulnerability
+ with Rails 2.3 and 3.0'
+ date: 2013-02-11
+ description: |
+ ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows
+ remote attackers to cause a denial of service or execute arbitrary code via crafted
+ serialized attributes that cause the +serialize+ helper to deserialize arbitrary
+ YAML.
+ cvss_v2: 10.0
+ patched_versions:
+ - "~> 2.3.17"
+ - ">= 3.1.0"
+---
diff --git a/advisories/_posts/2013-02-12-CVE-2013-0269.md b/advisories/_posts/2013-02-12-CVE-2013-0269.md
new file mode 100644
index 00000000..e5b172e9
--- /dev/null
+++ b/advisories/_posts/2013-02-12-CVE-2013-0269.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-0269 (json): CVE-2013-0269 rubygem-json: Denial of Service and SQL
+ Injection'
+comments: false
+categories:
+- json
+advisory:
+ gem: json
+ cve: 2013-0269
+ osvdb: 101137
+ ghsa: x457-cw4h-hq5f
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0269
+ title: 'CVE-2013-0269 rubygem-json: Denial of Service and SQL Injection'
+ date: 2013-02-12
+ description: |
+ The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7
+ for Ruby allows remote attackers to cause a denial of service (resource consumption)
+ or bypass the mass assignment protection mechanism via a crafted JSON document that
+ triggers the creation of arbitrary Ruby symbols or certain internal objects, as
+ demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe
+ Object Creation Vulnerability."
+ cvss_v2: 9.0
+ patched_versions:
+ - "~> 1.5.5"
+ - "~> 1.6.8"
+ - ">= 1.7.7"
+---
diff --git a/advisories/_posts/2013-02-12-OSVDB-115090.md b/advisories/_posts/2013-02-12-OSVDB-115090.md
new file mode 100644
index 00000000..29d0adb9
--- /dev/null
+++ b/advisories/_posts/2013-02-12-OSVDB-115090.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'OSVDB-115090 (bundler): Bundler Gem for Ruby Missing SSL Certificate Validation
+ MitM Spoofing'
+comments: false
+categories:
+- bundler
+advisory:
+ gem: bundler
+ osvdb: 115090
+ url: https://github.com/rubygems/bundler/releases/tag/v1.3.0.pre.8
+ title: Bundler Gem for Ruby Missing SSL Certificate Validation MitM Spoofing
+ date: 2013-02-12
+ description: |
+ Bundler Gem for Ruby contains a flaw as SSL certificates are not properly
+ validated. By spoofing the SSL server via a certificate that appears valid,
+ an attacker with the ability to intercept network traffic (e.g. MiTM, DNS
+ cache poisoning) can disclose and optionally manipulate transmitted data.
+ patched_versions:
+ - ">= 1.3.0.pre.8"
+ related:
+ url:
+ - https://github.com/rubygems/bundler/releases/tag/v1.3.0.pre.8
+ - https://my.diffend.io/gems/bundler/1.3.0.pre.7/1.3.0.pre.8
+ - https://my.diffend.io/gems/bundler/versions/1.0.0.beta.8
+ - http://www.osvdb.org/show/osvdb/115090
+---
diff --git a/advisories/_posts/2013-02-12-OSVDB-115091.md b/advisories/_posts/2013-02-12-OSVDB-115091.md
new file mode 100644
index 00000000..5e306919
--- /dev/null
+++ b/advisories/_posts/2013-02-12-OSVDB-115091.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'OSVDB-115091 (bundler): Bundler Gem for Ruby Redirection Remote HTTP Basic
+ Authentication Credential Disclosure'
+comments: false
+categories:
+- bundler
+advisory:
+ gem: bundler
+ osvdb: 115091
+ url: https://github.com/rubygems/bundler/releases/tag/v1.3.0.pre.8
+ title: Bundler Gem for Ruby Redirection Remote HTTP Basic Authentication Credential
+ Disclosure
+ date: 2013-02-12
+ description: |
+ Bundler Gem for Ruby contains a flaw that is triggered during the
+ redirection to other hosts. This may allow a remote attacker to
+ gain access to HTTP basic authentication credential information.
+ patched_versions:
+ - ">= 1.3.0.pre.8"
+ related:
+ url:
+ - https://github.com/rubygems/bundler/releases/tag/v1.3.0.pre.8
+ - https://my.diffend.io/gems/bundler/1.3.0.pre.7/1.3.0.pre.8
+ - https://my.diffend.io/gems/bundler/versions/1.0.0.beta.8
+ - http://www.osvdb.org/show/osvdb/115091
+---
diff --git a/advisories/_posts/2013-02-19-CVE-2013-1756.md b/advisories/_posts/2013-02-19-CVE-2013-1756.md
new file mode 100644
index 00000000..045386e7
--- /dev/null
+++ b/advisories/_posts/2013-02-19-CVE-2013-1756.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2013-1756 (fog-dragonfly): Dragonfly Gem for Ruby Crafted Request Parsing
+ Remote Code Execution'
+comments: false
+categories:
+- fog-dragonfly
+advisory:
+ gem: fog-dragonfly
+ cve: 2013-1756
+ osvdb: 90647
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1756
+ title: Dragonfly Gem for Ruby Crafted Request Parsing Remote Code Execution
+ date: 2013-02-19
+ description: |
+ Dragonfly Gem for Ruby contains a flaw that is triggered during the parsing
+ of a specially crafted request. This may allow a remote attacker to execute
+ arbitrary code.
+
+ This gem has been renamed. Please use "dragonfly" from now on.
+ cvss_v2: 7.5
+ unaffected_versions:
+ - "< 0.7.0"
+ patched_versions:
+ - ">= 0.9.14"
+---
diff --git a/advisories/_posts/2013-02-21-CVE-2013-0162.md b/advisories/_posts/2013-02-21-CVE-2013-0162.md
new file mode 100644
index 00000000..0c9e6479
--- /dev/null
+++ b/advisories/_posts/2013-02-21-CVE-2013-0162.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-0162 (ruby_parser): CVE-2013-0162 rubygem-ruby_parser: incorrect
+ temporary file usage'
+comments: false
+categories:
+- ruby_parser
+advisory:
+ gem: ruby_parser
+ cve: 2013-0162
+ osvdb: 90561
+ ghsa: 8mvw-22r7-w6fq
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0162
+ title: 'CVE-2013-0162 rubygem-ruby_parser: incorrect temporary file usage'
+ date: 2013-02-21
+ description: |
+ The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser
+ gem 3.1.1 and earlier for Ruby allows local users to overwrite arbitrary files via
+ a symlink attack on a temporary file with a predictable name in /tmp.
+ cvss_v2: 2.1
+ patched_versions:
+ - ">= 3.1.2"
+---
diff --git a/advisories/_posts/2013-02-21-CVE-2013-1607.md b/advisories/_posts/2013-02-21-CVE-2013-1607.md
new file mode 100644
index 00000000..1089ce24
--- /dev/null
+++ b/advisories/_posts/2013-02-21-CVE-2013-1607.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2013-1607 (pdfkit): PDFKit Gem for Ruby PDF File Generation Parameter
+ Handling Remote Code Execution'
+comments: false
+categories:
+- pdfkit
+advisory:
+ gem: pdfkit
+ cve: 2013-1607
+ osvdb: 90867
+ ghsa: 39v7-xpq4-8884
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1607
+ title: PDFKit Gem for Ruby PDF File Generation Parameter Handling Remote Code Execution
+ date: 2013-02-21
+ description: |
+ PDFKit Gem for Ruby contains a flaw that is due to the program failing
+ to properly validate input during the handling of parameters when generating PDF
+ files. This may allow a remote attacker to potentially execute arbitrary code via
+ the pdfkit generation options.
+ cvss_v3: 9.8
+ patched_versions:
+ - ">= 0.5.3"
+---
diff --git a/advisories/_posts/2013-02-21-CVE-2013-1656.md b/advisories/_posts/2013-02-21-CVE-2013-1656.md
new file mode 100644
index 00000000..b58773df
--- /dev/null
+++ b/advisories/_posts/2013-02-21-CVE-2013-1656.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2013-1656 (spree): Spree controller Parameter Arbitrary Ruby Object Instantiation
+ Command Execution'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ cve: 2013-1656
+ ghsa: jxx8-v83v-rhw3
+ url: https://blog.convisoappsec.com/en/spree-commerce-multiple-unsafe-reflection-vulnerabilities-cve-2013-1656
+ title: Spree controller Parameter Arbitrary Ruby Object Instantiation Command Execution
+ date: 2013-02-21
+ description: |
+ Spree Commerce 1.0.x through 1.3.2 allows remote authenticated
+ administrators to instantiate arbitrary Ruby objects and executd
+ arbitrary commands via the
+ (1) payment_method parameter to core/app/controllers/spree/admin/
+ payment_methods_controller.rb; and the
+ (2) promotion_action parameter to promotion_actions_controller.rb,
+ (3) promotion_rule parameter to promotion_rules_controller.rb, and
+ (4) calculator_type parameter to promotions_controller.rb in
+ promo/app/controllers/spree/admin/, related to unsafe use
+ of the constantize function.
+ cvss_v2: 4.3
+ patched_versions:
+ - ">= 2.0.0"
+ related:
+ url:
+ - https://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
+---
diff --git a/advisories/_posts/2013-02-21-CVE-2013-2506.md b/advisories/_posts/2013-02-21-CVE-2013-2506.md
new file mode 100644
index 00000000..f953232c
--- /dev/null
+++ b/advisories/_posts/2013-02-21-CVE-2013-2506.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2013-2506 (spree_auth_devise): Spree app/models/spree/user.rb Mass Role
+ Assignment Remote Privilege Escalation'
+comments: false
+categories:
+- spree_auth_devise
+advisory:
+ gem: spree_auth_devise
+ cve: 2013-2506
+ osvdb: 90865
+ ghsa: jp57-9j37-5476
+ url: https://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
+ title: Spree app/models/spree/user.rb Mass Role Assignment Remote Privilege Escalation
+ date: 2013-02-21
+ description: |
+ Spree contains a flaw that leads to unauthorized privileges being gained. The
+ issue is triggered as certain input related to mass role assignment in
+ app/models/spree/user.rb is not properly verified before being used to update
+ a user. This may allow a remote attacker to assign arbitrary roles and gain
+ elevated administrative privileges.
+ cvss_v2: 4.0
+ patched_versions:
+ - "~> 1.1.6"
+ - "~> 1.2.0"
+ - ">= 1.3.0"
+---
diff --git a/advisories/_posts/2013-02-25-OSVDB-114854.md b/advisories/_posts/2013-02-25-OSVDB-114854.md
new file mode 100644
index 00000000..d1ccbe3b
--- /dev/null
+++ b/advisories/_posts/2013-02-25-OSVDB-114854.md
@@ -0,0 +1,35 @@
+---
+layout: advisory
+title: 'OSVDB-114854 (activerecord-jdbc-adapter): ActiveRecord-JDBC-Adapter (AR-JDBC)
+ lib/arjdbc/jdbc/adapter.rb sql.gsub() Function SQL Injection'
+comments: false
+categories:
+- activerecord-jdbc-adapter
+- jruby
+advisory:
+ gem: activerecord-jdbc-adapter
+ platform: jruby
+ osvdb: 114854
+ url: https://github.com/jruby/activerecord-jdbc-adapter/issues/322
+ title: ActiveRecord-JDBC-Adapter (AR-JDBC) lib/arjdbc/jdbc/adapter.rb sql.gsub()
+ Function SQL Injection
+ date: 2013-02-25
+ description: |
+ ActiveRecord-JDBC-Adapter (AR-JDBC) contains a flaw that may allow carrying
+ out an SQL injection attack. The issue is due to the sql.gsub() function in
+ lib/arjdbc/jdbc/adapter.rb not properly sanitizing user-supplied input before
+ using it in SQL queries. This may allow a remote attacker to inject or
+ manipulate SQL queries in the back-end database, allowing for the
+ manipulation or disclosure of arbitrary data.
+ unaffected_versions:
+ - "< 1.2.6"
+ patched_versions:
+ - ">= 1.2.8"
+ related:
+ url:
+ - https://github.com/jruby/activerecord-jdbc-adapter/issues/322
+ - https://github.com/jruby/activerecord-jdbc-adapter/blob/master/lib/arjdbc/jdbc/adapter.rb
+ - https://security.snyk.io/vuln/SNYK-RUBY-ACTIVERECORDJDBCADAPTER-20076
+ - https://my.diffend.io/gems/activerecord-jdbc-adapter/1.2.5/1.2.8
+ - http://osvdb.org/show/osvdb/114854
+---
diff --git a/advisories/_posts/2013-02-28-CVE-2013-2512.md b/advisories/_posts/2013-02-28-CVE-2013-2512.md
new file mode 100644
index 00000000..74ba5325
--- /dev/null
+++ b/advisories/_posts/2013-02-28-CVE-2013-2512.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-2512 (ftpd): ftpd Gem for Ruby Shell Character Handling Remote Command
+ Injection'
+comments: false
+categories:
+- ftpd
+advisory:
+ gem: ftpd
+ cve: 2013-2512
+ osvdb: 90784
+ ghsa: 7vxr-6cxg-j3x8
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-2512
+ title: ftpd Gem for Ruby Shell Character Handling Remote Command Injection
+ date: 2013-02-28
+ description: |
+ ftpd Gem for Ruby contains a flaw that is triggered when handling a
+ specially crafted option or filename that contains a shell
+ character. This may allow a remote attacker to inject arbitrary
+ commands.
+ cvss_v2: 9.0
+ cvss_v3: 9.8
+ patched_versions:
+ - ">= 0.2.2"
+---
diff --git a/advisories/_posts/2013-02-28-CVE-2013-2516.md b/advisories/_posts/2013-02-28-CVE-2013-2516.md
new file mode 100644
index 00000000..e2c2a29f
--- /dev/null
+++ b/advisories/_posts/2013-02-28-CVE-2013-2516.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2013-2516 (fileutils): fileutils Gem for Ruby file_utils.rb Crafted URL
+ Handling Remote Command Execution'
+comments: false
+categories:
+- fileutils
+advisory:
+ gem: fileutils
+ cve: 2013-2516
+ osvdb: 90717
+ ghsa: 9x97-x2p9-hvpf
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-2516
+ title: fileutils Gem for Ruby file_utils.rb Crafted URL Handling Remote Command
+ Execution
+ date: 2013-02-28
+ description: |
+ fileutils Gem for Ruby contains a flaw in file_utils.rb. The issue is
+ triggered when handling a specially crafted URL containing a command after a delimiter
+ (;). This may allow a remote attacker to potentially execute arbitrary commands.
+ cvss_v3: 8.8
+ patched_versions:
+ - ">= 0.7.1"
+---
diff --git a/advisories/_posts/2013-03-04-CVE-2013-2513.md b/advisories/_posts/2013-03-04-CVE-2013-2513.md
new file mode 100644
index 00000000..6451252e
--- /dev/null
+++ b/advisories/_posts/2013-03-04-CVE-2013-2513.md
@@ -0,0 +1,21 @@
+---
+layout: advisory
+title: 'CVE-2013-2513 (flash_tool): flash_tool Gem for Ruby File Download Handling
+ Arbitrary Command Execution'
+comments: false
+categories:
+- flash_tool
+advisory:
+ gem: flash_tool
+ cve: 2013-2513
+ osvdb: 90829
+ ghsa: 6325-6g32-7p35
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-2513
+ title: flash_tool Gem for Ruby File Download Handling Arbitrary Command Execution
+ date: 2013-03-04
+ description: |
+ flash_tool Gem for Ruby contains a flaw that is triggered during the
+ handling of downloaded files that contain shell characters. With a specially crafted
+ file, a context-dependent attacker can execute arbitrary commands.
+ cvss_v3: 9.8
+---
diff --git a/advisories/_posts/2013-03-12-CVE-2013-2616.md b/advisories/_posts/2013-03-12-CVE-2013-2616.md
new file mode 100644
index 00000000..64acf68c
--- /dev/null
+++ b/advisories/_posts/2013-03-12-CVE-2013-2616.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2013-2616 (mini_magick): MiniMagick Gem for Ruby URI Handling Arbitrary
+ Command Injection'
+comments: false
+categories:
+- mini_magick
+advisory:
+ gem: mini_magick
+ cve: 2013-2616
+ osvdb: 91231
+ ghsa: w754-gq8r-pf5f
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-2616
+ title: MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection
+ date: 2013-03-12
+ description: |
+ MiniMagick Gem for Ruby contains a flaw that is triggered during the handling
+ of specially crafted input from an untrusted source passed via a URL that
+ contains a ';' character. This may allow a context-dependent attacker to
+ potentially execute arbitrary commands.
+ cvss_v2: 9.3
+ patched_versions:
+ - ">= 3.6.0"
+---
diff --git a/advisories/_posts/2013-03-12-CVE-2013-2617.md b/advisories/_posts/2013-03-12-CVE-2013-2617.md
new file mode 100644
index 00000000..45174d1b
--- /dev/null
+++ b/advisories/_posts/2013-03-12-CVE-2013-2617.md
@@ -0,0 +1,20 @@
+---
+layout: advisory
+title: 'CVE-2013-2617 (curl): CVE-2013-2617 rubygem-curl: insufficient URL escaping
+ command injection'
+comments: false
+categories:
+- curl
+advisory:
+ gem: curl
+ cve: 2013-2617
+ osvdb: 91230
+ ghsa: hxx6-p24v-wg8c
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-2617
+ title: 'CVE-2013-2617 rubygem-curl: insufficient URL escaping command injection'
+ date: 2013-03-12
+ description: |
+ lib/curl.rb in the Curl Gem for Ruby allows remote attackers to execute
+ arbitrary commands via shell metacharacters in a URL.
+ cvss_v2: 7.5
+---
diff --git a/advisories/_posts/2013-03-13-CVE-2013-2615.md b/advisories/_posts/2013-03-13-CVE-2013-2615.md
new file mode 100644
index 00000000..416827ea
--- /dev/null
+++ b/advisories/_posts/2013-03-13-CVE-2013-2615.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2013-2615 (fastreader): fastreader Gem for Ruby URI Handling Arbitrary
+ Command Injection'
+comments: false
+categories:
+- fastreader
+advisory:
+ gem: fastreader
+ cve: 2013-2615
+ osvdb: 91232
+ ghsa: w248-xr37-jx8m
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-2615
+ title: fastreader Gem for Ruby URI Handling Arbitrary Command Injection
+ date: 2013-03-13
+ description: |
+ fastreader Gem for Ruby contains a flaw that is triggered during the handling
+ of specially crafted input passed via a URL that contains a ';' character.
+ This may allow a context-dependent attacker to potentially execute arbitrary
+ commands.
+ cvss_v2: 9.3
+---
diff --git a/advisories/_posts/2013-03-18-CVE-2013-1875.md b/advisories/_posts/2013-03-18-CVE-2013-1875.md
new file mode 100644
index 00000000..f4be2687
--- /dev/null
+++ b/advisories/_posts/2013-03-18-CVE-2013-1875.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2013-1875 (command_wrap): command_wrap Gem for Ruby URI Handling Arbitrary
+ Command Injection'
+comments: false
+categories:
+- command_wrap
+advisory:
+ gem: command_wrap
+ cve: 2013-1875
+ osvdb: 91450
+ ghsa: p673-hjf2-pwfr
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1875
+ title: command_wrap Gem for Ruby URI Handling Arbitrary Command Injection
+ date: 2013-03-18
+ description: |
+ command_wrap Gem for Ruby contains a flaw that is triggered during the
+ handling of input passed via the URL that contains a semicolon character (;). This
+ will allow a remote attacker to inject arbitrary commands and have them executed
+ in the context of the user clicking it.
+ cvss_v2: 7.5
+---
diff --git a/advisories/_posts/2013-03-19-CVE-2013-1854.md b/advisories/_posts/2013-03-19-CVE-2013-1854.md
new file mode 100644
index 00000000..86d1d241
--- /dev/null
+++ b/advisories/_posts/2013-03-19-CVE-2013-1854.md
@@ -0,0 +1,33 @@
+---
+layout: advisory
+title: 'CVE-2013-1854 (activerecord): CVE-2013-1854 rubygem-activerecord: attribute_dos
+ Symbol DoS vulnerability'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2013-1854
+ osvdb: 91453
+ ghsa: 3crr-9vmg-864v
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1854
+ title: 'CVE-2013-1854 rubygem-activerecord: attribute_dos Symbol DoS vulnerability'
+ date: 2013-03-19
+ description: |
+ The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x
+ before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash
+ keys to symbols, which allows remote attackers to cause a denial of service via
+ crafted input to a where method. A flaw was found in the way Ruby on Rails handled
+ hashes in certain queries. A remote attacker could use this flaw to perform a denial
+ of service (resource consumption) attack by sending specially crafted queries that
+ would result in the creation of Ruby symbols, which were never garbage collected.
+ cvss_v2: 7.8
+ unaffected_versions:
+ - "~> 3.0.0"
+ patched_versions:
+ - "~> 2.3.18"
+ - "~> 3.1.12"
+ - ">= 3.2.13"
+---
diff --git a/advisories/_posts/2013-03-19-CVE-2013-1855.md b/advisories/_posts/2013-03-19-CVE-2013-1855.md
new file mode 100644
index 00000000..4e316e84
--- /dev/null
+++ b/advisories/_posts/2013-03-19-CVE-2013-1855.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2013-1855 (actionpack): CVE-2013-1855 rubygem-actionpack: css_sanitization:
+ XSS vulnerability in sanitize_css'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2013-1855
+ osvdb: 91452
+ ghsa: q759-hwvc-m3jg
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1855
+ title: 'CVE-2013-1855 rubygem-actionpack: css_sanitization: XSS vulnerability in
+ sanitize_css'
+ date: 2013-03-19
+ description: |
+ The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb
+ in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before
+ 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters,
+ which makes it easier for remote attackers to conduct cross-site scripting (XSS)
+ attacks via crafted Cascading Style Sheets (CSS) token sequences. A cross-site scripting
+ (XSS) flaw was found in Action Pack. A remote attacker could use this flaw to conduct
+ XSS attacks against users of an application using Action Pack.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 2.3.18"
+ - "~> 3.1.12"
+ - ">= 3.2.13"
+---
diff --git a/advisories/_posts/2013-03-19-CVE-2013-1856.md b/advisories/_posts/2013-03-19-CVE-2013-1856.md
new file mode 100644
index 00000000..03f4b13d
--- /dev/null
+++ b/advisories/_posts/2013-03-19-CVE-2013-1856.md
@@ -0,0 +1,34 @@
+---
+layout: advisory
+title: 'CVE-2013-1856 (activesupport): XML Parsing Vulnerability affecting JRuby users'
+comments: false
+categories:
+- activesupport
+- rails
+- jruby
+advisory:
+ gem: activesupport
+ framework: rails
+ platform: jruby
+ cve: 2013-1856
+ osvdb: 91451
+ ghsa: 9c2j-593q-3g82
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1856
+ title: XML Parsing Vulnerability affecting JRuby users
+ date: 2013-03-19
+ description: |
+ The ActiveSupport XML parsing functionality supports multiple
+ pluggable backends. One backend supported for JRuby users is
+ ActiveSupport::XmlMini_JDOM which makes use of the
+ javax.xml.parsers.DocumentBuilder class. In some JVM configurations
+ the default settings of that class can allow an attacker to construct
+ XML which, when parsed, will contain the contents of arbitrary URLs
+ including files from the application server. They may also allow for
+ various denial of service attacks. Action Pack
+ cvss_v2: 7.8
+ unaffected_versions:
+ - "~> 2.3.0"
+ patched_versions:
+ - "~> 3.1.12"
+ - ">= 3.2.13"
+---
diff --git a/advisories/_posts/2013-03-19-CVE-2013-1857.md b/advisories/_posts/2013-03-19-CVE-2013-1857.md
new file mode 100644
index 00000000..82abe151
--- /dev/null
+++ b/advisories/_posts/2013-03-19-CVE-2013-1857.md
@@ -0,0 +1,33 @@
+---
+layout: advisory
+title: 'CVE-2013-1857 (actionpack): CVE-2013-1857 rubygem-actionpack: sanitize_protocol:
+ XSS Vulnerability in the helper of Ruby on Rails'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2013-1857
+ osvdb: 91454
+ ghsa: j838-vfpq-fmf2
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1857
+ title: 'CVE-2013-1857 rubygem-actionpack: sanitize_protocol: XSS Vulnerability in
+ the helper of Ruby on Rails'
+ date: 2013-03-19
+ description: |
+ 'The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb
+ in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before
+ 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters
+ in URLs, which makes it easier for remote attackers to conduct cross-site scripting
+ (XSS) attacks via a crafted scheme name, as demonstrated by including a : sequence.
+ A cross-site scripting (XSS) flaw was found in Action Pack. A remote attacker could
+ use this flaw to conduct XSS attacks against users of an application using Action
+ Pack.'
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 2.3.18"
+ - "~> 3.1.12"
+ - ">= 3.2.13"
+---
diff --git a/advisories/_posts/2013-03-26-CVE-2013-1898.md b/advisories/_posts/2013-03-26-CVE-2013-1898.md
new file mode 100644
index 00000000..aa198318
--- /dev/null
+++ b/advisories/_posts/2013-03-26-CVE-2013-1898.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-1898 (thumbshooter): Thumbshooter Gem for Ruby thumbshooter.rb URL
+ Shell Metacharacter Injection Arbitrary Command Execution'
+comments: false
+categories:
+- thumbshooter
+advisory:
+ gem: thumbshooter
+ cve: 2013-1898
+ osvdb: 91839
+ ghsa: 7fqj-cg79-f2pv
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1898
+ title: Thumbshooter Gem for Ruby thumbshooter.rb URL Shell Metacharacter Injection
+ Arbitrary Command Execution
+ date: 2013-03-26
+ description: |
+ Thumbshooter Gem for Ruby contains a flaw that is due to the program
+ failing to properly sanitize input passed to thumbshooter.rb. With a specially crafted
+ URL that contains shell metacharacters, a context-dependent attacker can execute
+ arbitrary commands.
+ cvss_v2: 7.5
+---
diff --git a/advisories/_posts/2013-04-01-CVE-2013-1911.md b/advisories/_posts/2013-04-01-CVE-2013-1911.md
new file mode 100644
index 00000000..6ff4038b
--- /dev/null
+++ b/advisories/_posts/2013-04-01-CVE-2013-1911.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-1911 (ldoce): ldoce Gem for Ruby MP3 URL Shell Metacharacter Injection
+ Arbitrary Command Execution'
+comments: false
+categories:
+- ldoce
+advisory:
+ gem: ldoce
+ cve: 2013-1911
+ osvdb: 91870
+ ghsa: g266-3crh-h7gj
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1911
+ title: ldoce Gem for Ruby MP3 URL Shell Metacharacter Injection Arbitrary Command
+ Execution
+ date: 2013-04-01
+ description: |
+ ldoce Gem for Ruby contains a flaw that is triggered during the handling
+ of a specially crafted URL or filename for MP3 files that have shell metacharacters
+ injected in to it. This may allow a context-dependent attacker to execute arbitrary
+ commands.
+ cvss_v2: 6.8
+---
diff --git a/advisories/_posts/2013-04-04-CVE-2013-1947.md b/advisories/_posts/2013-04-04-CVE-2013-1947.md
new file mode 100644
index 00000000..c251c682
--- /dev/null
+++ b/advisories/_posts/2013-04-04-CVE-2013-1947.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-1947 (kelredd-pruview): kelredd-pruview Gem for Ruby /lib/pruview/document.rb
+ File Name Shell Metacharacter Injection Arbitrary Command Execution'
+comments: false
+categories:
+- kelredd-pruview
+advisory:
+ gem: kelredd-pruview
+ cve: 2013-1947
+ osvdb: 92228
+ ghsa: 78j3-7wpm-qhvp
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1947
+ title: kelredd-pruview Gem for Ruby /lib/pruview/document.rb File Name Shell Metacharacter
+ Injection Arbitrary Command Execution
+ date: 2013-04-04
+ description: |
+ kelredd-pruview Gem for Ruby contains a flaw in /lib/pruview/document.rb.
+ The issue is triggered during the handling of a specially crafted file name that
+ contains injected shell metacharacters. This may allow a context-dependent attacker
+ to potentially execute arbitrary commands.
+ cvss_v2: 9.3
+---
diff --git a/advisories/_posts/2013-04-08-CVE-2013-1933.md b/advisories/_posts/2013-04-08-CVE-2013-1933.md
new file mode 100644
index 00000000..caf7e665
--- /dev/null
+++ b/advisories/_posts/2013-04-08-CVE-2013-1933.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-1933 (karteek-docsplit): Karteek Docsplit Gem for Ruby text_extractor.rb
+ File Name Shell Metacharacter Injection Arbitrary Command Execution'
+comments: false
+categories:
+- karteek-docsplit
+advisory:
+ gem: karteek-docsplit
+ cve: 2013-1933
+ osvdb: 92117
+ ghsa: 4fvg-pwv7-v54g
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1933
+ title: Karteek Docsplit Gem for Ruby text_extractor.rb File Name Shell Metacharacter
+ Injection Arbitrary Command Execution
+ date: 2013-04-08
+ description: |
+ Karteek Docsplit Gem for Ruby contains a flaw that is due to the program
+ failing to properly sanitize input passed to text_extractor.rb. With a specially
+ crafted file name that contains shell metacharacters, a context-dependent attacker
+ can execute arbitrary commands
+ cvss_v2: 9.3
+---
diff --git a/advisories/_posts/2013-04-13-CVE-2013-1948.md b/advisories/_posts/2013-04-13-CVE-2013-1948.md
new file mode 100644
index 00000000..450fe12a
--- /dev/null
+++ b/advisories/_posts/2013-04-13-CVE-2013-1948.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-1948 (md2pdf): md2pdf Gem for Ruby md2pdf/converter.rb File Name
+ Shell Metacharacter Injection Arbitrary Command Execution'
+comments: false
+categories:
+- md2pdf
+advisory:
+ gem: md2pdf
+ cve: 2013-1948
+ osvdb: 92290
+ ghsa: 99ch-8mvp-g7m5
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-1948
+ title: md2pdf Gem for Ruby md2pdf/converter.rb File Name Shell Metacharacter Injection
+ Arbitrary Command Execution
+ date: 2013-04-13
+ description: |
+ md2pdf Gem for Ruby contains a flaw that is due to the program failing
+ to properly sanitize input passed to md2pdf/converter.rb. With a specially crafted
+ file name that contains shell metacharacters, a context-dependent attacker can execute
+ arbitrary commands
+ cvss_v2: 10.0
+---
diff --git a/advisories/_posts/2013-05-14-CVE-2013-2090.md b/advisories/_posts/2013-05-14-CVE-2013-2090.md
new file mode 100644
index 00000000..6dc514c6
--- /dev/null
+++ b/advisories/_posts/2013-05-14-CVE-2013-2090.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-2090 (cremefraiche): Creme Fraiche Gem for Ruby File Name Shell Metacharacter
+ Injection Arbitrary Command Execution'
+comments: false
+categories:
+- cremefraiche
+advisory:
+ gem: cremefraiche
+ cve: 2013-2090
+ osvdb: 93395
+ ghsa: m6f7-46hw-grcj
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-2090
+ title: Creme Fraiche Gem for Ruby File Name Shell Metacharacter Injection Arbitrary
+ Command Execution
+ date: 2013-05-14
+ description: |
+ Creme Fraiche Gem for Ruby contains a flaw that is due to the program
+ failing to properly sanitize input in file names. With a specially crafted file
+ name that contains shell metacharacters, a context-dependent attacker can execute
+ arbitrary commands
+ cvss_v2: 9.3
+ patched_versions:
+ - ">= 0.6.1"
+---
diff --git a/advisories/_posts/2013-05-17-CVE-2013-2105.md b/advisories/_posts/2013-05-17-CVE-2013-2105.md
new file mode 100644
index 00000000..40bf3775
--- /dev/null
+++ b/advisories/_posts/2013-05-17-CVE-2013-2105.md
@@ -0,0 +1,21 @@
+---
+layout: advisory
+title: 'CVE-2013-2105 (show_in_browser): Show In Browser Gem for Ruby /tmp/browser.html
+ Arbitrary Script Injection'
+comments: false
+categories:
+- show_in_browser
+advisory:
+ gem: show_in_browser
+ cve: 2013-2105
+ osvdb: 93490
+ ghsa: 9hx9-w2j6-rw76
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-2105
+ title: Show In Browser Gem for Ruby /tmp/browser.html Arbitrary Script Injection
+ date: 2013-05-17
+ description: |
+ Show In Browser Gem for Ruby contains a flaw that is triggered when the
+ application does not validate input passed via the /tmp/browser.html file. This
+ may allow a local attacker to create a specially crafted request that would execute
+ arbitrary script code in a user's browser.
+---
diff --git a/advisories/_posts/2013-05-29-CVE-2013-2119.md b/advisories/_posts/2013-05-29-CVE-2013-2119.md
new file mode 100644
index 00000000..1bf5f5f8
--- /dev/null
+++ b/advisories/_posts/2013-05-29-CVE-2013-2119.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-2119 (passenger): CVE-2013-2119 rubygem-passenger: incorrect temporary
+ file usage'
+comments: false
+categories:
+- passenger
+advisory:
+ gem: passenger
+ cve: 2013-2119
+ osvdb: 93752
+ ghsa: 9qj7-jvg4-qr2x
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-2119
+ title: 'CVE-2013-2119 rubygem-passenger: incorrect temporary file usage'
+ date: 2013-05-29
+ description: |
+ Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows
+ local users to cause a denial of service (prevent application start) or gain privileges
+ by pre-creating a temporary "config" file in a directory with a predictable name
+ in /tmp/ before it is used by the gem.
+ cvss_v2: 4.6
+ patched_versions:
+ - "~> 3.0.21"
+ - ">= 4.0.5"
+---
diff --git a/advisories/_posts/2013-06-10-CVE-2013-4136.md b/advisories/_posts/2013-06-10-CVE-2013-4136.md
new file mode 100644
index 00000000..20a20898
--- /dev/null
+++ b/advisories/_posts/2013-06-10-CVE-2013-4136.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-4136 (passenger): CVE-2013-4136 rubygem-passenger: insecure temporary
+ directory usage due toreuse of existing server instance directories'
+comments: false
+categories:
+- passenger
+advisory:
+ gem: passenger
+ cve: 2013-4136
+ osvdb: 94074
+ ghsa: w6rc-q387-vpgq
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-4136
+ title: 'CVE-2013-4136 rubygem-passenger: insecure temporary directory usage due
+ toreuse of existing server instance directories'
+ date: 2013-06-10
+ description: |
+ ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6
+ for Ruby allows local users to gain privileges or possibly change the ownership
+ of arbitrary directories via a symlink attack on a directory with a predictable
+ name in /tmp/.
+ cvss_v2: 4.6
+ patched_versions:
+ - ">= 4.0.8"
+---
diff --git a/advisories/_posts/2013-06-26-OSVDB-94679.md b/advisories/_posts/2013-06-26-OSVDB-94679.md
new file mode 100644
index 00000000..15a5a88c
--- /dev/null
+++ b/advisories/_posts/2013-06-26-OSVDB-94679.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'OSVDB-94679 (enum_column3): enum_column3 Gem for Ruby Symbol Creation Remote
+ DoS'
+comments: false
+categories:
+- enum_column3
+advisory:
+ gem: enum_column3
+ osvdb: 94679
+ url: https://security.snyk.io/vuln/SNYK-RUBY-ENUMCOLUMN3-20100
+ title: enum_column3 Gem for Ruby Symbol Creation Remote DoS
+ date: 2013-06-26
+ description: |
+ The enum_column3 Gem for Ruby contains a flaw that may allow a remote
+ denial of service. The issue is due to the program typecasting unexpected
+ strings to symbols. This may allow a remote attacker to crash the program.
+ related:
+ url:
+ - https://security.snyk.io/vuln/SNYK-RUBY-ENUMCOLUMN3-20100
+ - http://osvdb.org/show/osvdb/94679
+ notes: Never patched
+---
diff --git a/advisories/_posts/2013-07-09-CVE-2014-2538.md b/advisories/_posts/2013-07-09-CVE-2014-2538.md
new file mode 100644
index 00000000..c382be2b
--- /dev/null
+++ b/advisories/_posts/2013-07-09-CVE-2014-2538.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2014-2538 (rack-ssl): CVE-2014-2538 rubygem rack-ssl: URL error display
+ XSS'
+comments: false
+categories:
+- rack-ssl
+advisory:
+ gem: rack-ssl
+ cve: 2014-2538
+ osvdb: 104734
+ ghsa: v3rr-cph9-2g2q
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-2538
+ title: 'CVE-2014-2538 rubygem rack-ssl: URL error display XSS'
+ date: 2013-07-09
+ description: |
+ Cross-site scripting (XSS) vulnerability in lib/rack/ssl.rb in the rack-ssl
+ gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script
+ or HTML via a URI, which might not be properly handled by third-party adapters such
+ as JRuby-Rack.
+ cvss_v2: 4.3
+ patched_versions:
+ - ">= 1.3.4"
+---
diff --git a/advisories/_posts/2013-07-25-CVE-2013-4170.md b/advisories/_posts/2013-07-25-CVE-2013-4170.md
new file mode 100644
index 00000000..d8ee9c04
--- /dev/null
+++ b/advisories/_posts/2013-07-25-CVE-2013-4170.md
@@ -0,0 +1,34 @@
+---
+layout: advisory
+title: 'CVE-2013-4170 (ember-source): Ember.js Potential XSS Exploit When Binding
+ `tagName` to User-Supplied Data'
+comments: false
+categories:
+- ember-source
+advisory:
+ gem: ember-source
+ cve: 2013-4170
+ ghsa: 5m48-c37x-f792
+ url: https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM
+ title: Ember.js Potential XSS Exploit When Binding `tagName` to User-Supplied Data
+ date: 2013-07-25
+ description: |
+ In general, Ember.js escapes or strips any user-supplied content
+ before inserting it in strings that will be sent to innerHTML.
+ However, the `tagName` property of an `Ember.View` was inserted into
+ such a string without being sanitized. This means that if an
+ application assigns a view's `tagName` to user-supplied data, a
+ specially-crafted payload could execute arbitrary JavaScript in the
+ context of the current domain ("XSS").
+
+ This vulnerability only affects applications that assign or bind
+ user-provided content to `tagName`.
+ cvss_v3: 6.1
+ patched_versions:
+ - "~> 1.0.0.rc1.1"
+ - "~> 1.0.0.rc2.1"
+ - "~> 1.0.0.rc3.1"
+ - "~> 1.0.0.rc4.1"
+ - "~> 1.0.0.rc5.1"
+ - ">= 1.0.0.rc6.1"
+---
diff --git a/advisories/_posts/2013-08-02-CVE-2013-4203.md b/advisories/_posts/2013-08-02-CVE-2013-4203.md
new file mode 100644
index 00000000..11e25d4f
--- /dev/null
+++ b/advisories/_posts/2013-08-02-CVE-2013-4203.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2013-4203 (rgpg): rgpg Gem for Ruby lib/rgpg/gpg_helper.rb Remote Command
+ Execution'
+comments: false
+categories:
+- rgpg
+advisory:
+ gem: rgpg
+ cve: 2013-4203
+ osvdb: 95948
+ ghsa: jg4m-q6w8-vrjp
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-4203
+ title: rgpg Gem for Ruby lib/rgpg/gpg_helper.rb Remote Command Execution
+ date: 2013-08-02
+ description: |
+ rgpg Gem for Ruby contains a flaw in the GpgHelper module
+ (lib/rgpg/gpg_helper.rb). The issue is due to the program failing to properly
+ sanitize user-supplied input before being used in the system() function for
+ execution. This may allow a remote attacker to execute arbitrary commands.
+ cvss_v2: 7.5
+ patched_versions:
+ - ">= 0.2.3"
+---
diff --git a/advisories/_posts/2013-08-02-OSVDB-114435.md b/advisories/_posts/2013-08-02-OSVDB-114435.md
new file mode 100644
index 00000000..c7deec48
--- /dev/null
+++ b/advisories/_posts/2013-08-02-OSVDB-114435.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'OSVDB-114435 (devise): CSRF token fixation attacks in Devise'
+comments: false
+categories:
+- devise
+advisory:
+ gem: devise
+ osvdb: 114435
+ url: http://blog.plataformatec.com.br/2013/08/csrf-token-fixation-attacks-in-devise/
+ title: CSRF token fixation attacks in Devise
+ date: 2013-08-02
+ description: |
+ Devise contains a flaw that allows a remote, user-assisted attacker to
+ conduct a CSRF token fixation attack. This issue is triggered as previous
+ CSRF tokens are not properly invalidated when a new token is created.
+ If an attacker has knowledge of said token, a specially crafted request can
+ be made to it, allowing the attacker to conduct CSRF attacks.
+ patched_versions:
+ - "~> 2.2.5"
+ - ">= 3.0.1"
+ related:
+ url:
+ - http://blog.plataformatec.com.br/2013/08/csrf-token-fixation-attacks-in-devise
+ - https://github.com/heartcombo/devise/commit/747751a20f50aa8814dcd3eb9a3648f00ab6a707
+ - https://github.com/heartcombo/devise/compare/v3.0.0...v3.0.1
+ - https://my.diffend.io/gems/devise/3.0.0/3.0.1
+ - https://security.snyk.io/vuln/SNYK-RUBY-DEVISE-20103
+---
diff --git a/advisories/_posts/2013-08-03-OSVDB-96425.md b/advisories/_posts/2013-08-03-OSVDB-96425.md
new file mode 100644
index 00000000..4632e2c7
--- /dev/null
+++ b/advisories/_posts/2013-08-03-OSVDB-96425.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'OSVDB-96425 (redis-namespace): redis-namespace Gem for Ruby contains a flaw
+ in the method_missing implementation'
+comments: false
+categories:
+- redis-namespace
+advisory:
+ gem: redis-namespace
+ osvdb: 96425
+ url: http://blog.steveklabnik.com/posts/2013-08-03-redis-namespace-1-3-1--security-release
+ title: redis-namespace Gem for Ruby contains a flaw in the method_missing implementation
+ date: 2013-08-03
+ description: |
+ redis-namespace Gem for Ruby contains a flaw in the method_missing implementation.
+ The issue is triggered when handling exec commands called via send(). This may allow a
+ remote attacker to execute arbitrary commands.
+ patched_versions:
+ - "~> 1.0.4"
+ - "~> 1.1.1"
+ - "~> 1.2.2"
+ - ">= 1.3.1"
+ related:
+ url:
+ - http://blog.steveklabnik.com/posts/2013-08-03-redis-namespace-1-3-1--security-release
+ - https://github.com/resque/redis-namespace/issues/65
+ - https://github.com/resque/redis-namespace/commit/6d839515e8a3fdc17b5fb391500fda3f919689d6
+ - https://security.snyk.io/vuln/SNYK-RUBY-REDISNAMESPACE-20105
+---
diff --git a/advisories/_posts/2013-08-14-CVE-2013-5647.md b/advisories/_posts/2013-08-14-CVE-2013-5647.md
new file mode 100644
index 00000000..5295bfc6
--- /dev/null
+++ b/advisories/_posts/2013-08-14-CVE-2013-5647.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-5647 (sounder): Sounder Gem for Ruby File Name Handling Arbitrary
+ Command Execution'
+comments: false
+categories:
+- sounder
+advisory:
+ gem: sounder
+ cve: 2013-5647
+ osvdb: 96278
+ ghsa: rfmf-rx8w-935w
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-5647
+ title: Sounder Gem for Ruby File Name Handling Arbitrary Command Execution
+ date: 2013-08-14
+ description: |
+ Sounder Gem for Ruby contains a flaw that is triggered during the handling
+ of file names. This may allow a context-dependent attacker to execute
+ arbitrary commands.
+ cvss_v2: 7.5
+ patched_versions:
+ - ">= 1.0.2"
+---
diff --git a/advisories/_posts/2013-09-01-CVE-2013-4318.md b/advisories/_posts/2013-09-01-CVE-2013-4318.md
new file mode 100644
index 00000000..665a268e
--- /dev/null
+++ b/advisories/_posts/2013-09-01-CVE-2013-4318.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2013-4318 (features): Features Gem for Ruby /tmp/out.html Local XSS'
+comments: false
+categories:
+- features
+advisory:
+ gem: features
+ cve: 2013-4318
+ osvdb: 96975
+ ghsa: 42gq-h7xj-33r4
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-4318
+ title: Features Gem for Ruby /tmp/out.html Local XSS
+ date: 2013-09-01
+ description: |
+ Features Gem for Ruby contains a flaw that allows a local cross-site
+ scripting (XSS) attack. This flaw exists because the application does not validate
+ certain input upon submission to /tmp/out.html. This may allow an attacker to create
+ a specially crafted request that would execute arbitrary script code in a user's
+ browser within the trust relationship between their browser and the server.
+ cvss_v3: 5.4
+---
diff --git a/advisories/_posts/2013-09-03-CVE-2013-5671.md b/advisories/_posts/2013-09-03-CVE-2013-5671.md
new file mode 100644
index 00000000..d5badd47
--- /dev/null
+++ b/advisories/_posts/2013-09-03-CVE-2013-5671.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-5671 (fog-dragonfly): fog-dragonfly Gem for Ruby imagemagickutils.rb
+ Remote Command Execution'
+comments: false
+categories:
+- fog-dragonfly
+advisory:
+ gem: fog-dragonfly
+ cve: 2013-5671
+ osvdb: 96798
+ ghsa: qrgf-jqqm-x7xv
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-5671
+ title: fog-dragonfly Gem for Ruby imagemagickutils.rb Remote Command Execution
+ date: 2013-09-03
+ description: |
+ fog-dragonfly Gem for Ruby contains a flaw that is due to the program
+ failing to properly sanitize input passed via the imagemagickutils.rb script.
+ This may allow a remote attacker to execute arbitrary commands.
+
+ This gem has been renamed. Please use "dragonfly" from now on.
+ cvss_v2: 7.5
+ patched_versions:
+ - ">= 0.8.4"
+---
diff --git a/advisories/_posts/2013-09-09-CVE-2013-4287.md b/advisories/_posts/2013-09-09-CVE-2013-4287.md
new file mode 100644
index 00000000..06ac347d
--- /dev/null
+++ b/advisories/_posts/2013-09-09-CVE-2013-4287.md
@@ -0,0 +1,30 @@
+---
+layout: advisory
+title: 'CVE-2013-4287 (rubygems-update): CVE-2013-4287 rubygems: version regex algorithmic
+ complexity vulnerability'
+comments: false
+categories:
+- rubygems-update
+- rubygems
+advisory:
+ gem: rubygems-update
+ library: rubygems
+ cve: 2013-4287
+ osvdb: 97163
+ ghsa: 9j7m-rjqx-48vh
+ url: http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html
+ title: 'CVE-2013-4287 rubygems: version regex algorithmic complexity vulnerability'
+ date: 2013-09-09
+ description: |
+ Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN
+ in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x
+ before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows
+ remote attackers to cause a denial of service (CPU consumption) via a crafted gem
+ version that triggers a large amount of backtracking in a regular expression.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 1.8.23.1"
+ - "~> 1.8.26"
+ - "~> 2.0.8"
+ - ">= 2.1.0"
+---
diff --git a/advisories/_posts/2013-09-19-CVE-2013-6459.md b/advisories/_posts/2013-09-19-CVE-2013-6459.md
new file mode 100644
index 00000000..9aba717e
--- /dev/null
+++ b/advisories/_posts/2013-09-19-CVE-2013-6459.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2013-6459 (will_paginate): CVE-2013-6459 rubygem-will_paginate: XSS vulnerabilities'
+comments: false
+categories:
+- will_paginate
+advisory:
+ gem: will_paginate
+ cve: 2013-6459
+ osvdb: 101138
+ ghsa: 8r6h-7x9g-xmw9
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-6459
+ title: 'CVE-2013-6459 rubygem-will_paginate: XSS vulnerabilities'
+ date: 2013-09-19
+ description: |
+ Cross-site scripting (XSS) vulnerability in the will_paginate gem before
+ 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via
+ vectors involving generated pagination links. It was found that ruby will_paginate
+ is vulnerable to a XSS via malformed input that cause pagination to occur on an
+ improper boundary. This could allow an attacker with the ability to pass data to
+ the will_paginate gem to display arbitrary HTML including scripting code within
+ the web interface.
+ cvss_v2: 4.3
+ patched_versions:
+ - ">= 3.0.5"
+---
diff --git a/advisories/_posts/2013-09-24-CVE-2013-4363.md b/advisories/_posts/2013-09-24-CVE-2013-4363.md
new file mode 100644
index 00000000..ca1b57cb
--- /dev/null
+++ b/advisories/_posts/2013-09-24-CVE-2013-4363.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2013-4363 (rubygems-update): CVE-2013-4363 rubygems: version regex algorithmic
+ complexity vulnerability, incomplete CVE-2013-4287 fix'
+comments: false
+categories:
+- rubygems-update
+- rubygems
+advisory:
+ gem: rubygems-update
+ library: rubygems
+ cve: 2013-4363
+ osvdb: 97163
+ ghsa: 9qvm-2vhf-q649
+ url: http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html
+ title: 'CVE-2013-4363 rubygems: version regex algorithmic complexity vulnerability,
+ incomplete CVE-2013-4287 fix'
+ date: 2013-09-24
+ description: |
+ 'Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN
+ in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x
+ before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247,
+ allows remote attackers to cause a denial of service (CPU consumption) via a crafted
+ gem version that triggers a large amount of backtracking in a regular expression. NOTE:
+ this issue is due to an incomplete fix for CVE-2013-4287.'
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 1.8.23.2"
+ - "~> 1.8.27"
+ - "~> 2.0.10"
+ - ">= 2.1.5"
+---
diff --git a/advisories/_posts/2013-10-01-CVE-2013-7463.md b/advisories/_posts/2013-10-01-CVE-2013-7463.md
new file mode 100644
index 00000000..099c1ec0
--- /dev/null
+++ b/advisories/_posts/2013-10-01-CVE-2013-7463.md
@@ -0,0 +1,19 @@
+---
+layout: advisory
+title: 'CVE-2013-7463 (aescrypt): Vulnerability in aescrypt because IV is not randomized'
+comments: false
+categories:
+- aescrypt
+advisory:
+ gem: aescrypt
+ cve: 2013-7463
+ ghsa: 4c4w-3q45-hp9j
+ url: https://github.com/Gurpartap/aescrypt/issues/4
+ title: Vulnerability in aescrypt because IV is not randomized
+ date: 2013-10-01
+ description: |
+ The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the
+ AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to
+ defeat cryptographic protection mechanisms via a chosen plaintext attack.
+ cvss_v3: 7.5
+---
diff --git a/advisories/_posts/2013-10-08-CVE-2013-4413.md b/advisories/_posts/2013-10-08-CVE-2013-4413.md
new file mode 100644
index 00000000..34e204fa
--- /dev/null
+++ b/advisories/_posts/2013-10-08-CVE-2013-4413.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-4413 (wicked): Wicked Gem for Ruby contains a flaw'
+comments: false
+categories:
+- wicked
+advisory:
+ gem: wicked
+ cve: 2013-4413
+ osvdb: 98270
+ ghsa: rprj-g6xc-p5gq
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-4413
+ title: Wicked Gem for Ruby contains a flaw
+ date: 2013-10-08
+ description: |
+ Wicked Gem for Ruby contains a flaw that is due to the program failing
+ to properly sanitize input passed via the 'the_step' parameter upon submission to
+ the render_redirect.rb script. This may allow a remote attacker to gain access to
+ arbitrary files.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 1.0.1"
+---
diff --git a/advisories/_posts/2013-10-16-CVE-2013-4389.md b/advisories/_posts/2013-10-16-CVE-2013-4389.md
new file mode 100644
index 00000000..5f30e922
--- /dev/null
+++ b/advisories/_posts/2013-10-16-CVE-2013-4389.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-4389 (actionmailer): CVE-2013-4389 rubygem-actionmailer: email address
+ processing DoS'
+comments: false
+categories:
+- actionmailer
+- rails
+advisory:
+ gem: actionmailer
+ framework: rails
+ cve: 2013-4389
+ osvdb: 98629
+ ghsa: rg5m-3fqp-6px8
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-4389
+ title: 'CVE-2013-4389 rubygem-actionmailer: email address processing DoS'
+ date: 2013-10-16
+ description: |
+ Multiple format string vulnerabilities in log_subscriber.rb files in
+ the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15
+ allow remote attackers to cause a denial of service via a crafted e-mail address
+ that is improperly handled during construction of a log message.
+ cvss_v2: 4.3
+ unaffected_versions:
+ - "~> 2.3.2"
+ patched_versions:
+ - ">= 3.2.15"
+---
diff --git a/advisories/_posts/2013-10-22-CVE-2013-4457.md b/advisories/_posts/2013-10-22-CVE-2013-4457.md
new file mode 100644
index 00000000..54929fc4
--- /dev/null
+++ b/advisories/_posts/2013-10-22-CVE-2013-4457.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2013-4457 (cocaine): Cocaine Gem for Ruby contains a flaw'
+comments: false
+categories:
+- cocaine
+advisory:
+ gem: cocaine
+ cve: 2013-4457
+ osvdb: 98835
+ ghsa: c43v-hrmg-56r4
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-4457
+ title: Cocaine Gem for Ruby contains a flaw
+ date: 2013-10-22
+ description: |
+ Cocaine Gem for Ruby contains a flaw that is due to the method of variable
+ interpolation used by the program. With a specially crafted object, a context-dependent
+ attacker can execute arbitrary commands.
+ cvss_v2: 6.8
+ unaffected_versions:
+ - "< 0.4.0"
+ patched_versions:
+ - ">= 0.5.3"
+---
diff --git a/advisories/_posts/2013-10-29-CVE-2013-4478.md b/advisories/_posts/2013-10-29-CVE-2013-4478.md
new file mode 100644
index 00000000..a84855cb
--- /dev/null
+++ b/advisories/_posts/2013-10-29-CVE-2013-4478.md
@@ -0,0 +1,37 @@
+---
+layout: advisory
+title: 'CVE-2013-4478 (sup): Sup wrongly handled the filename of attachments'
+comments: false
+categories:
+- sup
+advisory:
+ gem: sup
+ cve: 2013-4478
+ osvdb: 99074
+ ghsa: 5f2p-6vjv-2q2m
+ url: https://web.archive.org/web/20140524012714/http://rubyforge.org/pipermail/sup-talk/2013-August/004993.html
+ title: Sup wrongly handled the filename of attachments
+ date: 2013-10-29
+ description: |
+ Sup MUA contains a flaw that is triggered when handling email attachment
+ content. This may allow a context-dependent attacker to execute arbitrary commands.
+ cvss_v2: 6.8
+ patched_versions:
+ - "~> 0.13.2.1"
+ - ">= 0.14.1.1"
+ related:
+ cve:
+ - 2013-4479
+ ghsa:
+ - hh2x-7mf9-78fr
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2013-4478
+ - https://github.com/sup-heliotrope/sup/blob/develop/History.txt
+ - https://www.openwall.com/lists/oss-security/2013/10/30/2
+ - https://web.archive.org/web/20140524012714/http://rubyforge.org/pipermail/sup-talk/2013-August/004993.html
+ - https://github.com/sup-heliotrope/sup/commit/8b46cdbfc14e07ca07d403aa28b0e7bc1c544785
+ - https://www.mend.io/vulnerability-database/CVE-2013-4478
+ - https://security-tracker.debian.org/tracker/CVE-2013-4478
+ - https://lwn.net/Articles/575351
+ - https://github.com/advisories/GHSA-5f2p-6vjv-2q2m
+---
diff --git a/advisories/_posts/2013-10-29-CVE-2013-4479.md b/advisories/_posts/2013-10-29-CVE-2013-4479.md
new file mode 100644
index 00000000..f20cefc5
--- /dev/null
+++ b/advisories/_posts/2013-10-29-CVE-2013-4479.md
@@ -0,0 +1,37 @@
+---
+layout: advisory
+title: 'CVE-2013-4479 (sup): Sup did not sanitize the content-type of attachments'
+comments: false
+categories:
+- sup
+advisory:
+ gem: sup
+ cve: 2013-4479
+ osvdb: 99074
+ ghsa: hh2x-7mf9-78fr
+ url: https://web.archive.org/web/20140524005344/http://rubyforge.org/pipermail/sup-talk/2013-October/004996.html
+ title: Sup did not sanitize the content-type of attachments
+ date: 2013-10-29
+ description: |
+ Sup MUA contains a flaw that is triggered when handling email attachment
+ content. This may allow a context-dependent attacker to execute arbitrary commands.
+ cvss_v2: 6.8
+ patched_versions:
+ - "~> 0.13.2.1"
+ - ">= 0.14.1.1"
+ related:
+ cve:
+ - 2013-4478
+ ghsa:
+ - 5f2p-6vjv-2q2m
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2013-4479
+ - https://web.archive.org/web/20140524005344/http://rubyforge.org/pipermail/sup-talk/2013-October/004996.html
+ - https://seclists.org/fulldisclosure/2013/Oct/272
+ - https://seclists.org/fulldisclosure/2013/Oct/att-272/whatsup.txt
+ - https://www.openwall.com/lists/oss-security/2013/10/30/2
+ - https://github.com/sup-heliotrope/sup/commit/ca0302e0c716682d2de22e9136400c704cc93e42
+ - https://security-tracker.debian.org/tracker/CVE-2013-4479
+ - https://lwn.net/Articles/575351
+ - https://github.com/advisories/GHSA-hh2x-7mf9-78fr
+---
diff --git a/advisories/_posts/2013-11-04-CVE-2013-4489.md b/advisories/_posts/2013-11-04-CVE-2013-4489.md
new file mode 100644
index 00000000..ed152222
--- /dev/null
+++ b/advisories/_posts/2013-11-04-CVE-2013-4489.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2013-4489 (gitlab-grit): GitLab Grit Gem for Ruby contains a flaw'
+comments: false
+categories:
+- gitlab-grit
+advisory:
+ gem: gitlab-grit
+ cve: 2013-4489
+ osvdb: 99370
+ ghsa: 95xq-v4m2-fq3r
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-4489
+ title: GitLab Grit Gem for Ruby contains a flaw
+ date: 2013-11-04
+ description: |
+ GitLab Grit Gem for Ruby contains a flaw in the app/contexts/search_context.rb
+ script. The issue is triggered when input passed via the code search box is not
+ properly sanitized, which allows strings to be evaluated by the Bourne shell. This
+ may allow a remote attacker to execute arbitrary commands.
+ patched_versions:
+ - ">= 2.6.1"
+---
diff --git a/advisories/_posts/2013-11-12-CVE-2013-4562.md b/advisories/_posts/2013-11-12-CVE-2013-4562.md
new file mode 100644
index 00000000..e9bfd096
--- /dev/null
+++ b/advisories/_posts/2013-11-12-CVE-2013-4562.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-4562 (omniauth-facebook): omniauth-facebook Gem for Ruby Unspecified
+ CSRF'
+comments: false
+categories:
+- omniauth-facebook
+advisory:
+ gem: omniauth-facebook
+ cve: 2013-4562
+ osvdb: 99693
+ ghsa: cf36-985g-v73c
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-4562
+ title: omniauth-facebook Gem for Ruby Unspecified CSRF
+ date: 2013-11-12
+ description: |
+ omniauth-facebook Gem for Ruby contains a flaw as HTTP requests do not
+ require multiple steps, explicit confirmation, or a unique token when
+ performing certain sensitive actions. By tricking a user into following
+ a specially crafted link, a context-dependent attacker can perform a
+ Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to
+ perform an unspecified action.
+ cvss_v2: 6.8
+ unaffected_versions:
+ - "<= 1.4.0"
+ patched_versions:
+ - ">= 1.5.0"
+---
diff --git a/advisories/_posts/2013-11-14-CVE-2013-4593.md b/advisories/_posts/2013-11-14-CVE-2013-4593.md
new file mode 100644
index 00000000..44e1d4e5
--- /dev/null
+++ b/advisories/_posts/2013-11-14-CVE-2013-4593.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-4593 (omniauth-facebook): omniauth-facebook Gem for Ruby Insecure
+ Access Token Handling Authentication Bypass'
+comments: false
+categories:
+- omniauth-facebook
+advisory:
+ gem: omniauth-facebook
+ cve: 2013-4593
+ osvdb: 99888
+ ghsa: 33vg-hpx5-pfxg
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-4593
+ title: omniauth-facebook Gem for Ruby Insecure Access Token Handling Authentication
+ Bypass
+ date: 2013-11-14
+ description: |
+ omniauth-facebook Gem for Ruby contains a flaw that is due to the application
+ supporting passing the access token via the URL. This may allow a remote
+ attacker to bypass authentication and authenticate as another user.
+ cvss_v2: 6.8
+ cvss_v3: 7.5
+ patched_versions:
+ - ">= 1.5.1"
+---
diff --git a/advisories/_posts/2013-12-02-CVE-2013-6421.md b/advisories/_posts/2013-12-02-CVE-2013-6421.md
new file mode 100644
index 00000000..3a2e11c4
--- /dev/null
+++ b/advisories/_posts/2013-12-02-CVE-2013-6421.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2013-6421 (sprout): sprout Gem for Ruby archive_unpacker.rb unpack_zip()
+ Function Multiple Parameter Arbitrary Code Execution'
+comments: false
+categories:
+- sprout
+advisory:
+ gem: sprout
+ cve: 2013-6421
+ osvdb: 100598
+ ghsa: 229r-pqp6-8w6g
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-6421
+ title: sprout Gem for Ruby archive_unpacker.rb unpack_zip() Function Multiple Parameter
+ Arbitrary Code Execution
+ date: 2013-12-02
+ description: |
+ sprout Gem for Ruby contains a flaw in the unpack_zip() function in
+ archive_unpacker.rb. The issue is due to the program failing to properly
+ sanitize input passed via the 'zip_file', 'dir', 'zip_name', and 'output'
+ parameters. This may allow a context-dependent attacker to execute arbitrary
+ code.
+ cvss_v2: 7.5
+ unaffected_versions:
+ - "< 0.7.246"
+---
diff --git a/advisories/_posts/2013-12-03-CVE-2013-4491.md b/advisories/_posts/2013-12-03-CVE-2013-4491.md
new file mode 100644
index 00000000..ee41ff4e
--- /dev/null
+++ b/advisories/_posts/2013-12-03-CVE-2013-4491.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-4491 (actionpack): Reflective XSS Vulnerability in Ruby on Rails'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2013-4491
+ osvdb: 100528
+ ghsa: 699m-mcjm-9cw8
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
+ title: Reflective XSS Vulnerability in Ruby on Rails
+ date: 2013-12-03
+ description: |
+ There is a vulnerability in the internationalization component of Ruby on
+ Rails. Under certain common configurations an attacker can provide specially
+ crafted input which will execute a reflective XSS attack.
+
+ The root cause of this issue is a vulnerability in the i18n gem which has
+ been assigned the identifier CVE-2013-4492.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 3.2.16"
+ - ">= 4.0.2"
+---
diff --git a/advisories/_posts/2013-12-03-CVE-2013-4492.md b/advisories/_posts/2013-12-03-CVE-2013-4492.md
new file mode 100644
index 00000000..0e151cda
--- /dev/null
+++ b/advisories/_posts/2013-12-03-CVE-2013-4492.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2013-4492 (i18n): i18n missing translation error message XSS'
+comments: false
+categories:
+- i18n
+advisory:
+ gem: i18n
+ cve: 2013-4492
+ osvdb: 100528
+ ghsa: r5hc-9xx5-97rw
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
+ title: i18n missing translation error message XSS
+ date: 2013-12-03
+ description: |
+ The HTML exception message raised by I18n::MissingTranslation fails
+ to escape the keys.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 0.5.1"
+ - ">= 0.6.6"
+---
diff --git a/advisories/_posts/2013-12-03-CVE-2013-6414.md b/advisories/_posts/2013-12-03-CVE-2013-6414.md
new file mode 100644
index 00000000..2e544b88
--- /dev/null
+++ b/advisories/_posts/2013-12-03-CVE-2013-6414.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2013-6414 (actionpack): Denial of Service Vulnerability in Action View'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2013-6414
+ osvdb: 100525
+ ghsa: mpxf-gcw2-pw5q
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/A-ebV4WxzKg
+ title: Denial of Service Vulnerability in Action View
+ date: 2013-12-03
+ description: |
+ There is a denial of service vulnerability in the header handling component of
+ Action View.
+ cvss_v2: 5.0
+ unaffected_versions:
+ - "~> 2.3.0"
+ patched_versions:
+ - "~> 3.2.16"
+ - ">= 4.0.2"
+---
diff --git a/advisories/_posts/2013-12-03-CVE-2013-6415.md b/advisories/_posts/2013-12-03-CVE-2013-6415.md
new file mode 100644
index 00000000..70af34f3
--- /dev/null
+++ b/advisories/_posts/2013-12-03-CVE-2013-6415.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2013-6415 (actionpack): XSS Vulnerability in number_to_currency'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2013-6415
+ osvdb: 100524
+ ghsa: 6h5q-96hp-9jgm
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/9WiRn2nhfq0
+ title: XSS Vulnerability in number_to_currency
+ date: 2013-12-03
+ description: |
+ There is an XSS vulnerability in the number_to_currency helper in Ruby on Raile.
+ The number_to_currency helper allows users to nicely format a numeric value. One
+ of the parameters to the helper (unit) is not escaped correctly. Applications
+ which pass user controlled data as the unit parameter are vulnerable to an XSS attack.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 3.2.16"
+ - ">= 4.0.2"
+---
diff --git a/advisories/_posts/2013-12-03-CVE-2013-6416.md b/advisories/_posts/2013-12-03-CVE-2013-6416.md
new file mode 100644
index 00000000..500dbc00
--- /dev/null
+++ b/advisories/_posts/2013-12-03-CVE-2013-6416.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2013-6416 (actionpack): XSS Vulnerability in simple_format helper'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2013-6416
+ osvdb: 100526
+ ghsa: w37c-q653-qg95
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/5ZI1-H5OoIM
+ title: XSS Vulnerability in simple_format helper
+ date: 2013-12-03
+ description: |
+ There is a vulnerability in the simple_format helper in Ruby on Rails.
+ The simple_format helper converts user supplied text into html text
+ which is intended to be safe for display. A change made to the
+ implementation of this helper means that any user provided HTML
+ attributes will not be escaped correctly. As a result of this error,
+ applications which pass user-controlled data to be included as html
+ attributes will be vulnerable to an XSS attack.
+ cvss_v2: 4.3
+ unaffected_versions:
+ - "~> 2.3.0"
+ - "~> 3.1.0"
+ - "~> 3.2.0"
+ patched_versions:
+ - ">= 4.0.2"
+---
diff --git a/advisories/_posts/2013-12-03-CVE-2013-6417.md b/advisories/_posts/2013-12-03-CVE-2013-6417.md
new file mode 100644
index 00000000..1bb115ae
--- /dev/null
+++ b/advisories/_posts/2013-12-03-CVE-2013-6417.md
@@ -0,0 +1,31 @@
+---
+layout: advisory
+title: 'CVE-2013-6417 (actionpack): Incomplete fix to CVE-2013-0155 (Unsafe Query
+ Generation Risk)'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2013-6417
+ osvdb: 100527
+ ghsa: wpw7-wxjm-cw8r
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4
+ title: Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)
+ date: 2013-12-03
+ description: |
+ The prior fix to CVE-2013-0155 was incomplete and the use of common
+ 3rd party libraries can accidentally circumvent the protection. Due
+ to the way that Rack::Request and Rails::Request interact, it is
+ possible for a 3rd party or custom rack middleware to parse the
+ parameters insecurely and store them in the same key that Rails uses
+ for its own parameters. In the event that happens the application
+ will receive unsafe parameters and could be vulnerable to the earlier
+ vulnerability.
+ cvss_v2: 6.4
+ patched_versions:
+ - "~> 3.2.16"
+ - ">= 4.0.2"
+---
diff --git a/advisories/_posts/2013-12-12-CVE-2013-7086.md b/advisories/_posts/2013-12-12-CVE-2013-7086.md
new file mode 100644
index 00000000..ed73180b
--- /dev/null
+++ b/advisories/_posts/2013-12-12-CVE-2013-7086.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2013-7086 (webbynode): Webbynode Gem for Ruby notify.rb growlnotify Message
+ Handling Arbitrary Command Execution'
+comments: false
+categories:
+- webbynode
+advisory:
+ gem: webbynode
+ cve: 2013-7086
+ osvdb: 100920
+ ghsa: p65m-qr5x-rrqq
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-7086
+ title: Webbynode Gem for Ruby notify.rb growlnotify Message Handling Arbitrary Command
+ Execution
+ date: 2013-12-12
+ description: |
+ Webbynode Gem for Ruby contains a flaw in notify.rb that is triggered
+ when handling a specially crafted growlnotify message. This may allow a
+ context-dependent attacker to execute arbitrary commands.
+ cvss_v2: 7.5
+---
diff --git a/advisories/_posts/2013-12-14-CVE-2013-6460.md b/advisories/_posts/2013-12-14-CVE-2013-6460.md
new file mode 100644
index 00000000..81086b04
--- /dev/null
+++ b/advisories/_posts/2013-12-14-CVE-2013-6460.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2013-6460 (nokogiri): CVE-2013-6460 rubygem-nokogiri: DoS while parsing
+ XML documents'
+comments: false
+categories:
+- nokogiri
+- jruby
+advisory:
+ gem: nokogiri
+ platform: jruby
+ cve: 2013-6460
+ osvdb: 101179
+ ghsa: 62qp-3fxm-9wxf
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-6460
+ title: 'CVE-2013-6460 rubygem-nokogiri: DoS while parsing XML documents'
+ date: 2013-12-14
+ description: |
+ Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing
+ XML documents
+ cvss_v2: 4.3
+ cvss_v3: 6.5
+ patched_versions:
+ - "~> 1.5.11"
+ - ">= 1.6.1"
+---
diff --git a/advisories/_posts/2013-12-14-CVE-2013-6461.md b/advisories/_posts/2013-12-14-CVE-2013-6461.md
new file mode 100644
index 00000000..07f32e30
--- /dev/null
+++ b/advisories/_posts/2013-12-14-CVE-2013-6461.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2013-6461 (nokogiri): CVE-2013-6461 rubygem-nokogiri: DoS while parsing
+ XML entities'
+comments: false
+categories:
+- nokogiri
+advisory:
+ gem: nokogiri
+ cve: 2013-6461
+ osvdb: 101458
+ ghsa: jmhh-w7xp-wg39
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-6461
+ title: 'CVE-2013-6461 rubygem-nokogiri: DoS while parsing XML entities'
+ date: 2013-12-14
+ description: |
+ Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing
+ to apply limits
+ cvss_v3: 6.5
+ patched_versions:
+ - "~> 1.5.11"
+ - ">= 1.6.1"
+---
diff --git a/advisories/_posts/2013-12-14-CVE-2013-7111.md b/advisories/_posts/2013-12-14-CVE-2013-7111.md
new file mode 100644
index 00000000..924817b4
--- /dev/null
+++ b/advisories/_posts/2013-12-14-CVE-2013-7111.md
@@ -0,0 +1,20 @@
+---
+layout: advisory
+title: 'CVE-2013-7111 (bio-basespace-sdk): Bio Basespace SDK Gem for Ruby Command
+ Line API Key Disclosure'
+comments: false
+categories:
+- bio-basespace-sdk
+advisory:
+ gem: bio-basespace-sdk
+ cve: 2013-7111
+ osvdb: 101031
+ ghsa: xwr3-fmgj-mmfr
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-7111
+ title: Bio Basespace SDK Gem for Ruby Command Line API Key Disclosure
+ date: 2013-12-14
+ description: |
+ Bio Basespace SDK Gem for Ruby contains a flaw that is due to the API
+ client code passing the API_KEY to a curl command. This may allow a local attacker
+ to gain access to API key information by monitoring the process table.
+---
diff --git a/advisories/_posts/2013-12-24-CVE-2013-7222.md b/advisories/_posts/2013-12-24-CVE-2013-7222.md
new file mode 100644
index 00000000..fd1116f5
--- /dev/null
+++ b/advisories/_posts/2013-12-24-CVE-2013-7222.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-7222 (fat_free_crm): Fat Free CRM Gem for Ruby lack of support for
+ cycling the Rails session secret'
+comments: false
+categories:
+- fat_free_crm
+advisory:
+ gem: fat_free_crm
+ cve: 2013-7222
+ osvdb: 101445
+ ghsa: g897-cgfc-7q8v
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-7222
+ title: Fat Free CRM Gem for Ruby lack of support for cycling the Rails session secret
+ date: 2013-12-24
+ description: |
+ Fat Free CRM contains a flaw that is due to the application defining a static
+ security session token in config/initialiers/secret_token.rb. If a remote
+ attacker has explicit knowledge of this token, they can potentially execute
+ arbitrary code.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 0.13.0"
+ - "~> 0.12.1"
+---
diff --git a/advisories/_posts/2013-12-24-CVE-2013-7223.md b/advisories/_posts/2013-12-24-CVE-2013-7223.md
new file mode 100644
index 00000000..b7ecdb8a
--- /dev/null
+++ b/advisories/_posts/2013-12-24-CVE-2013-7223.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-7223 (fat_free_crm): Fat Free CRM Gem for Ruby contains multiple
+ cross-site request forgery (CSRF) vulnerabilities'
+comments: false
+categories:
+- fat_free_crm
+advisory:
+ gem: fat_free_crm
+ cve: 2013-7223
+ osvdb: 101446
+ ghsa: mcvq-7xjq-46x6
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-7223
+ title: Fat Free CRM Gem for Ruby contains multiple cross-site request forgery (CSRF)
+ vulnerabilities
+ date: 2013-12-24
+ description: |
+ Fat Free CRM contains a flaw as the application is missing the protect_from_forgery
+ statement, therefore HTTP requests to app/controllers/application_controller.rb
+ do not require multiple steps, explicit confirmation, or a unique token when
+ performing certain sensitive actions. By tricking a user into following a specially
+ crafted link, a context-dependent attacker can perform a Cross-Site Request Forgery
+ (CSRF / XSRF) attack causing the victim to perform unspecified actions.
+ cvss_v2: 6.8
+ patched_versions:
+ - ">= 0.13.0"
+ - "~> 0.12.1"
+---
diff --git a/advisories/_posts/2013-12-24-CVE-2013-7224.md b/advisories/_posts/2013-12-24-CVE-2013-7224.md
new file mode 100644
index 00000000..89ae76b6
--- /dev/null
+++ b/advisories/_posts/2013-12-24-CVE-2013-7224.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2013-7224 (fat_free_crm): Fat Free CRM Gem for Ruby allows remote attackers
+ to obtain sensitive informations'
+comments: false
+categories:
+- fat_free_crm
+advisory:
+ gem: fat_free_crm
+ cve: 2013-7224
+ osvdb: 101447
+ ghsa: 4xq9-vw89-p5cx
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-7224
+ title: Fat Free CRM Gem for Ruby allows remote attackers to obtain sensitive informations
+ date: 2013-12-24
+ description: |
+ Fat Free CRM contains a flaw in user controllers that is triggered as JSON
+ requests are rendered with a full JSON object. This may allow a remote
+ attacker to gain access to potentially sensitive information e.g. other
+ users password hashes.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 0.13.0"
+ - "~> 0.12.1"
+---
diff --git a/advisories/_posts/2013-12-24-CVE-2013-7225.md b/advisories/_posts/2013-12-24-CVE-2013-7225.md
new file mode 100644
index 00000000..bf963590
--- /dev/null
+++ b/advisories/_posts/2013-12-24-CVE-2013-7225.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-7225 (fat_free_crm): Fat Free CRM Gem for Ruby allows remote attackers
+ to inject or manipulate SQL queries'
+comments: false
+categories:
+- fat_free_crm
+advisory:
+ gem: fat_free_crm
+ cve: 2013-7225
+ osvdb: 101448
+ ghsa: 9ggp-5rf4-x7q9
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-7225
+ title: Fat Free CRM Gem for Ruby allows remote attackers to inject or manipulate
+ SQL queries
+ date: 2013-12-24
+ description: |
+ Fat Free CRM contains a flaw that may allow carrying out an SQL injection
+ attack. The issue is due to the app/controllers/home_controller.rb script
+ not properly sanitizing user-supplied input to the 'state' parameter or
+ input passed via comments and emails. This may allow a remote attacker to
+ inject or manipulate SQL queries in the back-end database, allowing for
+ the manipulation or disclosure of arbitrary data.
+ cvss_v2: 6.5
+ patched_versions:
+ - ">= 0.13.0"
+ - "~> 0.12.1"
+---
diff --git a/advisories/_posts/2013-12-24-CVE-2013-7249.md b/advisories/_posts/2013-12-24-CVE-2013-7249.md
new file mode 100644
index 00000000..d5e964e6
--- /dev/null
+++ b/advisories/_posts/2013-12-24-CVE-2013-7249.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2013-7249 (fat_free_crm): Fat Free CRM Gem for Ruby allows remote attackers
+ to obtain sensitive informations'
+comments: false
+categories:
+- fat_free_crm
+advisory:
+ gem: fat_free_crm
+ cve: 2013-7249
+ osvdb: 101700
+ ghsa: f25h-3mj6-4jpg
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-7249
+ title: Fat Free CRM Gem for Ruby allows remote attackers to obtain sensitive informations
+ date: 2013-12-24
+ description: |
+ Fat Free CRM contains a flaw that is triggered when the attacker sends a
+ direct request for XML data. This may allow a remote attacker to gain
+ access to potentially sensitive information.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 0.13.0"
+ - "~> 0.12.1"
+---
diff --git a/advisories/_posts/2013-12-26-CVE-2014-1233.md b/advisories/_posts/2013-12-26-CVE-2014-1233.md
new file mode 100644
index 00000000..8e6278da
--- /dev/null
+++ b/advisories/_posts/2013-12-26-CVE-2014-1233.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2014-1233 (paratrooper-pingdom): paratrooper-pingdom Gem for Ruby /lib/paratrooper-pingdom.rb
+ API Login Credentials Local Disclosure'
+comments: false
+categories:
+- paratrooper-pingdom
+advisory:
+ gem: paratrooper-pingdom
+ cve: 2014-1233
+ osvdb: 101847
+ ghsa: fqrr-rrwg-69pv
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-1233
+ title: paratrooper-pingdom Gem for Ruby /lib/paratrooper-pingdom.rb API Login Credentials
+ Local Disclosure
+ date: 2013-12-26
+ description: |
+ paratrooper-pingdom Gem for Ruby contains a flaw in
+ /lib/paratrooper-pingdom.rb. The issue is triggered when the script exposes
+ API login credentials, allowing a local attacker to gain access to the API
+ key, username, and password for the API login by monitoring the process tree.
+ cvss_v2: 2.1
+---
diff --git a/advisories/_posts/2013-12-31-OSVDB-101577.md b/advisories/_posts/2013-12-31-OSVDB-101577.md
new file mode 100644
index 00000000..8e3e73b1
--- /dev/null
+++ b/advisories/_posts/2013-12-31-OSVDB-101577.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'OSVDB-101577 (flukso4r): flukso4r Gem for Ruby /lib/flukso/R.rb Arbitrary
+ Command Execution'
+comments: false
+categories:
+- flukso4r
+advisory:
+ gem: flukso4r
+ osvdb: 101577
+ url: https://vulners.com/seebug/SSV:61267
+ title: flukso4r Gem for Ruby /lib/flukso/R.rb Arbitrary Command Execution
+ date: 2013-12-31
+ description: |
+ flukso4r Gem for Ruby contains a flaw in /lib/flukso/R.rb that is due
+ to the application failing to properly validate user-supplied input. This may allow
+ a context-dependent attacker to execute arbitrary commands.
+ notes: No patched version
+ related:
+ url:
+ - https://security.snyk.io/vuln/SNYK-RUBY-FLUKSO4R-20136
+ - https://vulners.com/seebug/SSV:61267
+ - http://osvdb.org/show/osvdb/101577
+---
diff --git a/advisories/_posts/2014-01-08-CVE-2014-1234.md b/advisories/_posts/2014-01-08-CVE-2014-1234.md
new file mode 100644
index 00000000..a08d1314
--- /dev/null
+++ b/advisories/_posts/2014-01-08-CVE-2014-1234.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2014-1234 (paratrooper-newrelic): Paratrooper-newrelic Gem for Ruby Process
+ Listing API Key Local Disclosure'
+comments: false
+categories:
+- paratrooper-newrelic
+advisory:
+ gem: paratrooper-newrelic
+ cve: 2014-1234
+ osvdb: 101839
+ ghsa: 959j-5g9v-3fpq
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-1234
+ title: Paratrooper-newrelic Gem for Ruby Process Listing API Key Local Disclosure
+ date: 2014-01-08
+ description: |
+ Paratrooper-newrelic Gem for Ruby contains a flaw in
+ /lib/paratrooper-newrelic.rb. The issue is triggered when the script exposes
+ the API key, allowing a local attacker to gain access to it by monitoring the
+ process tree.
+ cvss_v2: 2.1
+---
diff --git a/advisories/_posts/2014-01-14-CVE-2014-0013.md b/advisories/_posts/2014-01-14-CVE-2014-0013.md
new file mode 100644
index 00000000..a7a727c0
--- /dev/null
+++ b/advisories/_posts/2014-01-14-CVE-2014-0013.md
@@ -0,0 +1,42 @@
+---
+layout: advisory
+title: 'CVE-2014-0013 (ember-source): Ember.js Potential XSS Exploit With User-Supplied
+ Data When Binding Primitive Values'
+comments: false
+categories:
+- ember-source
+advisory:
+ gem: ember-source
+ cve: 2014-0013
+ ghsa: 8xm3-gm7c-5fjx
+ url: https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4
+ title: Ember.js Potential XSS Exploit With User-Supplied Data When Binding Primitive
+ Values
+ date: 2014-01-14
+ description: |
+ In general, Ember.js escapes or strips any user-supplied content before
+ inserting it in strings that will be sent to innerHTML. However, we have
+ identified a vulnerability that could lead to unescaped content being inserted
+ into the innerHTML string without being sanitized.
+
+ When a primitive value is used as the Handlebars context, that value is not
+ properly escaped. An example of this would be using the `{{each}}` helper to
+ iterate over an array of user-supplied strings and using `{{this}}` inside the
+ block to display each string.
+
+ In applications that contain templates whose context is a primitive value and
+ use the `{{this}}` keyword to display that value, a specially-crafted payload
+ could execute arbitrary JavaScript in the context of the current domain
+ ("XSS").
+
+ This vulnerability affects applications that contain templates whose context is
+ set to a user-supplied primitive value (such as a string or number) and also
+ contain the `{{this}}` special Handlebars variable to display the value.
+ cvss_v3: 5.4
+ patched_versions:
+ - "~> 1.0.1"
+ - "~> 1.1.3"
+ - "~> 1.2.1"
+ - "~> 1.3.1"
+ - ">= 1.4.0.beta.2"
+---
diff --git a/advisories/_posts/2014-01-14-CVE-2014-0014.md b/advisories/_posts/2014-01-14-CVE-2014-0014.md
new file mode 100644
index 00000000..ea829af0
--- /dev/null
+++ b/advisories/_posts/2014-01-14-CVE-2014-0014.md
@@ -0,0 +1,39 @@
+---
+layout: advisory
+title: 'CVE-2014-0014 (ember-source): Ember.js Potential XSS Exploit With User-Supplied
+ Data When Using {{group}} Helper'
+comments: false
+categories:
+- ember-source
+advisory:
+ gem: ember-source
+ cve: 2014-0014
+ ghsa: rcx6-7jp6-pqf2
+ url: https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4
+ title: Ember.js Potential XSS Exploit With User-Supplied Data When Using {{group}}
+ Helper
+ date: 2014-01-14
+ description: |
+ In general, Ember.js escapes or strips any user-supplied content before
+ inserting it in strings that will be sent to innerHTML. However, we have
+ identified a vulnerability that could lead to unescaped content being inserted
+ into the innerHTML string without being sanitized.
+
+ When using the `{{group}}` helper, user supplied content in the template was not
+ being sanitized. Though the vulnerability exists in Ember.js proper, it is only
+ exposed via the use of an experimental plugin.
+
+ In applications that use the `{{group}}` helper, a specially-crafted payload
+ could execute arbitrary JavaScript in the context of the current domain
+ ("XSS").
+
+ This vulnerability only affects applications that use the `{{group}}` helper
+ to display user-provided content.
+ cvss_v3: 5.4
+ patched_versions:
+ - "~> 1.0.1"
+ - "~> 1.1.3"
+ - "~> 1.2.1"
+ - "~> 1.3.1"
+ - ">= 1.4.0.beta.2"
+---
diff --git a/advisories/_posts/2014-01-14-CVE-2014-1834.md b/advisories/_posts/2014-01-14-CVE-2014-1834.md
new file mode 100644
index 00000000..aacf51fa
--- /dev/null
+++ b/advisories/_posts/2014-01-14-CVE-2014-1834.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2014-1834 (echor): echor Gem for Ruby backplane.rb perform_request Function
+ Arbitrary Command Execution'
+comments: false
+categories:
+- echor
+advisory:
+ gem: echor
+ cve: 2014-1834
+ osvdb: 102129
+ ghsa: 8936-cgj4-phr2
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-1834
+ title: echor Gem for Ruby backplane.rb perform_request Function Arbitrary Command
+ Execution
+ date: 2014-01-14
+ description: |
+ Echor Gem for Ruby contains a flaw in backplane.rb in the perform_request
+ function that is triggered when a semi-colon (;) is injected into a username
+ or password. This may allow a context-dependent attacker to inject arbitrary
+ commands if the gem is used in a rails application.
+ cvss_v3: 7.8
+---
diff --git a/advisories/_posts/2014-01-14-CVE-2014-1835.md b/advisories/_posts/2014-01-14-CVE-2014-1835.md
new file mode 100644
index 00000000..11b31718
--- /dev/null
+++ b/advisories/_posts/2014-01-14-CVE-2014-1835.md
@@ -0,0 +1,21 @@
+---
+layout: advisory
+title: 'CVE-2014-1835 (echor): echor Gem for Ruby Process Listing Local Plaintext
+ Credential Disclosure'
+comments: false
+categories:
+- echor
+advisory:
+ gem: echor
+ cve: 2014-1835
+ osvdb: 102130
+ ghsa: j4gx-p3x5-m987
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-1835
+ title: echor Gem for Ruby Process Listing Local Plaintext Credential Disclosure
+ date: 2014-01-14
+ description: |
+ echor Gem for Ruby contains a flaw that is due to the program exposing
+ credential information in the system process listing. This may allow a local
+ attacker to gain access to plaintext credential information.
+ cvss_v3: 7.8
+---
diff --git a/advisories/_posts/2014-01-28-CVE-2014-1831.md b/advisories/_posts/2014-01-28-CVE-2014-1831.md
new file mode 100644
index 00000000..f97713df
--- /dev/null
+++ b/advisories/_posts/2014-01-28-CVE-2014-1831.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2014-1831 (passenger): CVE-2014-1831 CVE-2014-1832 rubygem-passenger:
+ insecure use of temporary files'
+comments: false
+categories:
+- passenger
+advisory:
+ gem: passenger
+ cve: 2014-1831
+ osvdb: 102613
+ ghsa: c7j7-p5jq-26ff
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-1831
+ title: 'CVE-2014-1831 CVE-2014-1832 rubygem-passenger: insecure use of temporary
+ files'
+ date: 2014-01-28
+ description: |
+ Phusion Passenger before 4.0.37 allows local users to write to certain
+ files and directories via a symlink attack on (1) control_process.pid or a (2) generation-*
+ file.
+ cvss_v2: 2.1
+ patched_versions:
+ - ">= 4.0.37"
+---
diff --git a/advisories/_posts/2014-01-29-CVE-2014-1832.md b/advisories/_posts/2014-01-29-CVE-2014-1832.md
new file mode 100644
index 00000000..e0ed3b01
--- /dev/null
+++ b/advisories/_posts/2014-01-29-CVE-2014-1832.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2014-1832 (passenger): CVE-2014-1831 CVE-2014-1832 rubygem-passenger:
+ insecure use of temporary files'
+comments: false
+categories:
+- passenger
+advisory:
+ gem: passenger
+ cve: 2014-1832
+ osvdb: 102613
+ ghsa: qw8w-2xcp-xg59
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-1832
+ title: 'CVE-2014-1831 CVE-2014-1832 rubygem-passenger: insecure use of temporary
+ files'
+ date: 2014-01-29
+ description: |
+ 'Phusion Passenger 4.0.37 allows local users to write to certain files
+ and directories via a symlink attack on (1) control_process.pid or a (2) generation-*
+ file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.'
+ cvss_v2: 2.1
+ patched_versions:
+ - ">= 4.0.38"
+---
diff --git a/advisories/_posts/2014-01-31-OSVDB-103151.md b/advisories/_posts/2014-01-31-OSVDB-103151.md
new file mode 100644
index 00000000..75723c53
--- /dev/null
+++ b/advisories/_posts/2014-01-31-OSVDB-103151.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'OSVDB-103151 (paperclip): Paperclip: Access Restriction Bypass'
+comments: false
+categories:
+- paperclip
+advisory:
+ gem: paperclip
+ osvdb: 103151
+ url: https://security.snyk.io/vuln/SNYK-RUBY-PAPERCLIP-20144
+ title: 'Paperclip: Access Restriction Bypass'
+ date: 2014-01-31
+ description: |
+ Paperclip Gem for Ruby contains a flaw that is due to the application
+ failing to properly validate the file extension, instead only validating the Content-Type
+ header during file uploads. This may allow a remote attacker to bypass restrictions
+ on file types for uploaded files by spoofing the content-type.
+ patched_versions:
+ - ">= 4.0.0"
+ related:
+ url:
+ - https://thoughtbot.com/blog/prevent-spoofing-with-paperclip
+ - https://www.theregister.com/2014/02/09/content_type_spoofing_bug_in_ror_paperclip
+ - https://security.snyk.io/vuln/SNYK-RUBY-PAPERCLIP-20144
+ - http://osvdb.org/show/osvdb/103151
+---
diff --git a/advisories/_posts/2014-02-07-CVE-2014-0046.md b/advisories/_posts/2014-02-07-CVE-2014-0046.md
new file mode 100644
index 00000000..d4446109
--- /dev/null
+++ b/advisories/_posts/2014-02-07-CVE-2014-0046.md
@@ -0,0 +1,35 @@
+---
+layout: advisory
+title: 'CVE-2014-0046 (ember-source): Ember.js XSS Vulnerability With {{link-to}}
+ Helper in Non-block Form'
+comments: false
+categories:
+- ember-source
+advisory:
+ gem: ember-source
+ cve: 2014-0046
+ ghsa: 4q53-fqhc-cr46
+ url: https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ
+ title: Ember.js XSS Vulnerability With {{link-to}} Helper in Non-block Form
+ date: 2014-02-07
+ description: |
+ In general, Ember.js escapes or strips any user-supplied content before
+ inserting it in strings that will be sent to innerHTML. However, a change made
+ to the implementation of the {{link-to}} helper means that any user-supplied
+ data bound to the {{link-to}} helper's title attribute will not be escaped
+ correctly.
+
+ In applications that use the {{link-to}} helper in non-block form and bind
+ the title attribute to user-supplied content, a specially-crafted payload
+ could execute arbitrary JavaScript in the context of the current domain
+ ("XSS").
+
+ All users running an affected release and binding user-supplied data to the
+ {{link-to}} helper's title attribute should either upgrade or use one of the
+ workarounds immediately.
+ unaffected_versions:
+ - "< 1.2.0"
+ patched_versions:
+ - "~> 1.2.2"
+ - ">= 1.3.2"
+---
diff --git a/advisories/_posts/2014-02-13-CVE-2014-0083.md b/advisories/_posts/2014-02-13-CVE-2014-0083.md
new file mode 100644
index 00000000..efecb5e9
--- /dev/null
+++ b/advisories/_posts/2014-02-13-CVE-2014-0083.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2014-0083 (net-ldap): CVE-2014-0083 rubygem-net-ldap: SSHA passwords generated
+ by the net-ldap Ruby gem use a weak salt'
+comments: false
+categories:
+- net-ldap
+advisory:
+ gem: net-ldap
+ cve: 2014-0083
+ osvdb: 106108
+ ghsa: qwgm-mxm4-3q2c
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-0083
+ title: 'CVE-2014-0083 rubygem-net-ldap: SSHA passwords generated by the net-ldap
+ Ruby gem use a weak salt'
+ date: 2014-02-13
+ description: |
+ The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA
+ passwords.
+ cvss_v2: 1.9
+ cvss_v3: 5.5
+ patched_versions:
+ - ">= 0.6.0"
+---
diff --git a/advisories/_posts/2014-02-18-CVE-2014-0080.md b/advisories/_posts/2014-02-18-CVE-2014-0080.md
new file mode 100644
index 00000000..e4cca673
--- /dev/null
+++ b/advisories/_posts/2014-02-18-CVE-2014-0080.md
@@ -0,0 +1,30 @@
+---
+layout: advisory
+title: 'CVE-2014-0080 (activerecord): CVE-2014-0080 rubygem-activerecord: PostgreSQL
+ array data injection vulnerability'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2014-0080
+ osvdb: 103438
+ ghsa: hqf9-rc9j-5fmj
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-0080
+ title: 'CVE-2014-0080 rubygem-activerecord: PostgreSQL array data injection vulnerability'
+ date: 2014-02-18
+ description: |
+ SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/cast.rb
+ in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL
+ is used, allows remote attackers to execute "add data" SQL commands via vectors
+ involving \ (backslash) characters that are not properly handled in operations on
+ array columns.
+ unaffected_versions:
+ - "< 3.2.0"
+ - "~> 3.2.0"
+ patched_versions:
+ - "~> 4.0.3"
+ - ">= 4.1.0.beta2"
+---
diff --git a/advisories/_posts/2014-02-18-CVE-2014-0081.md b/advisories/_posts/2014-02-18-CVE-2014-0081.md
new file mode 100644
index 00000000..8f111831
--- /dev/null
+++ b/advisories/_posts/2014-02-18-CVE-2014-0081.md
@@ -0,0 +1,30 @@
+---
+layout: advisory
+title: 'CVE-2014-0081 (actionpack): CVE-2014-0081 rubygem-actionpack: number_to_currency,
+ number_to_percentage and number_to_human XSS vulnerability'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2014-0081
+ osvdb: 103439
+ ghsa: m46p-ggm5-5j83
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-0081
+ title: 'CVE-2014-0081 rubygem-actionpack: number_to_currency, number_to_percentage
+ and number_to_human XSS vulnerability'
+ date: 2014-02-18
+ description: |
+ Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb
+ in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2
+ allow remote attackers to inject arbitrary web script or HTML via the (1) format,
+ (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage,
+ or (c) number_to_human helper.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 3.2.17"
+ - "~> 4.0.3"
+ - ">= 4.1.0.beta2"
+---
diff --git a/advisories/_posts/2014-02-18-CVE-2014-0082.md b/advisories/_posts/2014-02-18-CVE-2014-0082.md
new file mode 100644
index 00000000..9ea3e494
--- /dev/null
+++ b/advisories/_posts/2014-02-18-CVE-2014-0082.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'CVE-2014-0082 (actionpack): CVE-2014-0082 rubygem-actionpack: Action View
+ string handling denial of service'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2014-0082
+ osvdb: 103440
+ ghsa: 7cgp-c3g7-qvrw
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-0082
+ title: 'CVE-2014-0082 rubygem-actionpack: Action View string handling denial of
+ service'
+ date: 2014-02-18
+ description: |
+ actionpack/lib/action_view/template/text.rb in Action View in Ruby on
+ Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the
+ :text option to the render method, which allows remote attackers to cause a denial
+ of service (memory consumption) by including these strings in headers.
+ cvss_v2: 5.0
+ unaffected_versions:
+ - ">= 4.0.0"
+ patched_versions:
+ - ">= 3.2.17"
+---
diff --git a/advisories/_posts/2014-03-05-CVE-2014-0036.md b/advisories/_posts/2014-03-05-CVE-2014-0036.md
new file mode 100644
index 00000000..d836d7bb
--- /dev/null
+++ b/advisories/_posts/2014-03-05-CVE-2014-0036.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2014-0036 (rbovirt): CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client'
+comments: false
+categories:
+- rbovirt
+advisory:
+ gem: rbovirt
+ cve: 2014-0036
+ osvdb: 104080
+ ghsa: ww79-8xwv-932x
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-0036
+ title: 'CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client'
+ date: 2014-03-05
+ description: |
+ The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with
+ SSL verification disabled, which allows remote attackers to conduct man-in-the-middle
+ attacks via unspecified vectors.
+ cvss_v2: 6.8
+ patched_versions:
+ - ">= 0.0.24"
+---
diff --git a/advisories/_posts/2014-03-10-CVE-2014-2322.md b/advisories/_posts/2014-03-10-CVE-2014-2322.md
new file mode 100644
index 00000000..28145d6f
--- /dev/null
+++ b/advisories/_posts/2014-03-10-CVE-2014-2322.md
@@ -0,0 +1,37 @@
+---
+layout: advisory
+title: 'CVE-2014-2322 (Arabic-Prawn): Arabic Prawn Gem for Ruby lib/string_utf_support.rb
+ User Input Handling Remote Command Injection'
+comments: false
+categories:
+- Arabic-Prawn
+advisory:
+ gem: Arabic-Prawn
+ cve: 2014-2322
+ osvdb: 104365
+ ghsa: hgmw-x865-hf9x
+ url: http://www.openwall.com/lists/oss-security/2014/03/10/8
+ title: Arabic Prawn Gem for Ruby lib/string_utf_support.rb User Input Handling Remote
+ Command Injection
+ date: 2014-03-10
+ description: |
+ Arabic Prawn Gem for Ruby contains a flaw in the lib/string_utf_support.rb
+ file. The issue is due to the program failing to sanitize user input. This may
+ allow a remote attacker to inject arbitrary commands.
+
+ "lib/string_utf_support.rb" in the Arabic Prawn 0.0.1 gem for Ruby
+ allows remote attackers to execute arbitrary commands via shell
+ metacharacters in the (1) downloaded_file or (2) url variable.
+ cvss_v2: 7.5
+ notes: Never patched
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-2322
+ - http://www.openwall.com/lists/oss-security/2014/03/10/8
+ - http://www.openwall.com/lists/oss-security/2014/03/12/6
+ - https://web.archive.org/web/20160306235714/http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html
+ - http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html
+ - http://www.vapidlabs.com/advisory.php?v=16
+ - https://github.com/advisories/GHSA-hgmw-x865-hf9x
+ - https://rubygems.org/gems/Arabic-Prawn
+---
diff --git a/advisories/_posts/2014-03-13-CVE-2014-0135.md b/advisories/_posts/2014-03-13-CVE-2014-0135.md
new file mode 100644
index 00000000..35c2facf
--- /dev/null
+++ b/advisories/_posts/2014-03-13-CVE-2014-0135.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'CVE-2014-0135 (kafo): CVE-2014-0135 rubygem-kafo: temporary file creation
+ vulnerability when creating /tmp/default_values.yaml'
+comments: false
+categories:
+- kafo
+advisory:
+ gem: kafo
+ cve: 2014-0135
+ osvdb: 106826
+ ghsa: hxvp-655x-xxqv
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-0135
+ title: 'CVE-2014-0135 rubygem-kafo: temporary file creation vulnerability when creating
+ /tmp/default_values.yaml'
+ date: 2014-03-13
+ description: |
+ Kafo before 0.3.17 and 0.4.x before 0.5.2, as used by Foreman, uses world-readable
+ permissions for default_values.yaml, which allows local users to obtain passwords
+ and other sensitive information by reading the file.
+ cvss_v2: 1.9
+ patched_versions:
+ - "~> 0.3.17"
+ - ">= 0.5.2"
+ related:
+ url:
+ - https://github.com/rubysec/ruby-advisory-db/issues/238
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/world-readable-permissions-as-default/ruby/sid-740/summary
+---
diff --git a/advisories/_posts/2014-03-25-CVE-2014-4920.md b/advisories/_posts/2014-03-25-CVE-2014-4920.md
new file mode 100644
index 00000000..ea2b278b
--- /dev/null
+++ b/advisories/_posts/2014-03-25-CVE-2014-4920.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2014-4920 (twitter-bootstrap-rails): Reflective XSS Vulnerability in twitter-bootstrap-rails'
+comments: false
+categories:
+- twitter-bootstrap-rails
+- rails
+advisory:
+ gem: twitter-bootstrap-rails
+ framework: rails
+ cve: 2014-4920
+ osvdb: 109206
+ ghsa: vpqv-mqvc-pcx2
+ url: https://nvisium.com/blog/2014/03/28/reflected-xss-vulnerability-in-twitter
+ title: Reflective XSS Vulnerability in twitter-bootstrap-rails
+ date: 2014-03-25
+ description: |
+ The twitter-bootstrap-rails Gem for Rails contains a flaw that enables a
+ reflected cross-site scripting (XSS) attack. This flaw exists because the
+ bootstrap_flash helper method does not validate input when handling flash
+ messages before returning it to users. This may allow a context-dependent
+ attacker to create a specially crafted request that would execute arbitrary
+ script code in a user's browser session within the trust relationship between
+ their browser and the server.
+ patched_versions:
+ - ">= 3.2.0"
+---
diff --git a/advisories/_posts/2014-03-28-CVE-2014-0156.md b/advisories/_posts/2014-03-28-CVE-2014-0156.md
new file mode 100644
index 00000000..06518df3
--- /dev/null
+++ b/advisories/_posts/2014-03-28-CVE-2014-0156.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2014-0156 (awesome_spawn): OS command injection flaw in awesome_spawn'
+comments: false
+categories:
+- awesome_spawn
+advisory:
+ gem: awesome_spawn
+ cve: 2014-0156
+ ghsa: qpqw-mc85-qvm9
+ url: https://github.com/ManageIQ/awesome_spawn/commit/e524f85f1c6e292ef7d117d7818521307ac269ff
+ title: OS command injection flaw in awesome_spawn
+ date: 2014-03-28
+ description: |
+ Awesome spawn contains OS command injection vulnerability, which allows
+ execution of additional commands passed to Awesome spawn as arguments, e.g. AwesomeSpawn.run('ls',:params
+ => {'-l' => ";touch haxored"}). If untrusted input was included in command arguments,
+ attacker could use this flaw to execute arbitrary command.
+ cvss_v2: 6.8
+ cvss_v3: 9.8
+ patched_versions:
+ - "~> 1.2.0"
+ - ">= 1.3.0"
+---
diff --git a/advisories/_posts/2014-04-16-CVE-2014-2888.md b/advisories/_posts/2014-04-16-CVE-2014-2888.md
new file mode 100644
index 00000000..d77100c2
--- /dev/null
+++ b/advisories/_posts/2014-04-16-CVE-2014-2888.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2014-2888 (sfpagent): sfpagent Gem for Ruby JSON[body] Module Name Remote
+ Command Execution'
+comments: false
+categories:
+- sfpagent
+advisory:
+ gem: sfpagent
+ cve: 2014-2888
+ osvdb: 105971
+ ghsa: vm28-mrm7-fpjq
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-2888
+ title: sfpagent Gem for Ruby JSON[body] Module Name Remote Command Execution
+ date: 2014-04-16
+ description: |
+ sfpagent Gem for Ruby contains a flaw that is triggered as JSON[body]
+ input is not properly sanitized when handling module names with shell
+ metacharacters. This may allow a context-dependent attacker to execute
+ arbitrary commands.
+ cvss_v2: 7.5
+ patched_versions:
+ - ">= 0.4.15"
+---
diff --git a/advisories/_posts/2014-04-24-OSVDB-106279.md b/advisories/_posts/2014-04-24-OSVDB-106279.md
new file mode 100644
index 00000000..a399de58
--- /dev/null
+++ b/advisories/_posts/2014-04-24-OSVDB-106279.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'OSVDB-106279 (jruby-sandbox): jruby-sandbox Java Class Importation Sandbox
+ Bypass'
+comments: false
+categories:
+- jruby-sandbox
+- jruby
+advisory:
+ gem: jruby-sandbox
+ platform: jruby
+ osvdb: 106279
+ url: https://security.snyk.io/vuln/SNYK-RUBY-JRUBYSANDBOX-20156
+ title: jruby-sandbox Java Class Importation Sandbox Bypass
+ date: 2014-04-24
+ description: |
+ jruby-sandbox contains a flaw that is triggered when importing Java Classes.
+ This may allow a remote attacker to bypass the sandbox for code execution.
+ patched_versions:
+ - ">= 0.2.3"
+ related:
+ url:
+ - https://www.exploit-db.com/exploits/33028
+ - https://security.snyk.io/vuln/SNYK-RUBY-JRUBYSANDBOX-20156
+---
diff --git a/advisories/_posts/2014-04-30-OSVDB-118481.md b/advisories/_posts/2014-04-30-OSVDB-118481.md
new file mode 100644
index 00000000..c8350cec
--- /dev/null
+++ b/advisories/_posts/2014-04-30-OSVDB-118481.md
@@ -0,0 +1,31 @@
+---
+layout: advisory
+title: 'OSVDB-118481 (nokogiri): Nokogiri Gem for JRuby XML Document Root Element
+ Handling Memory Consumption Remote DoS'
+comments: false
+categories:
+- nokogiri
+- jruby
+advisory:
+ gem: nokogiri
+ platform: jruby
+ osvdb: 118481
+ url: https://github.com/sparklemotion/nokogiri/pull/1087
+ title: Nokogiri Gem for JRuby XML Document Root Element Handling Memory Consumption
+ Remote DoS
+ date: 2014-04-30
+ description: |
+ Nokogiri Gem for JRuby contains a flaw that is triggered when
+ handling a root element in an XML document. This may allow a
+ remote attacker to cause a consumption of memory resources.
+ patched_versions:
+ - "~> 1.6.2.2"
+ - ">= 1.6.3"
+ related:
+ cve:
+ - 2013-6461
+ url:
+ - https://github.com/sparklemotion/nokogiri/pull/1087
+ - https://github.com/sparklemotion/nokogiri/pull/1087/commits/8293bf6fddecb68b688cf025859afde7609f7bff
+ - https://github.com/sparklemotion/nokogiri/commit/a098ddfc9990ea79dbc191407d3e83611e5ff1e6
+---
diff --git a/advisories/_posts/2014-05-06-CVE-2014-0130.md b/advisories/_posts/2014-05-06-CVE-2014-0130.md
new file mode 100644
index 00000000..0ef2ab43
--- /dev/null
+++ b/advisories/_posts/2014-05-06-CVE-2014-0130.md
@@ -0,0 +1,30 @@
+---
+layout: advisory
+title: 'CVE-2014-0130 (actionpack): Directory Traversal Vulnerability With Certain
+ Route Configurations'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2014-0130
+ ghsa: 6x85-j5j2-27jx
+ url: https://groups.google.com/forum/#!topic/rubyonrails-security/NkKc7vTW70o
+ title: Directory Traversal Vulnerability With Certain Route Configurations
+ date: 2014-05-06
+ description: |
+ There is a vulnerability in the 'implicit render'
+ functionality in Ruby on Rails.The implicit render functionality
+ allows controllers to render a template, even if there is no
+ explicit action with the corresponding name. This module does not
+ perform adequate input sanitization which could allow an attacker to
+ use a specially crafted request to retrieve arbitrary files from the
+ rails application server.
+ cvss_v2: 4.3
+ patched_versions:
+ - "~> 3.2.18"
+ - "~> 4.0.5"
+ - ">= 4.1.1"
+---
diff --git a/advisories/_posts/2014-06-07-OSVDB-107783.md b/advisories/_posts/2014-06-07-OSVDB-107783.md
new file mode 100644
index 00000000..472d1327
--- /dev/null
+++ b/advisories/_posts/2014-06-07-OSVDB-107783.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'OSVDB-107783 (screen_capture): Screen Capture Gem for Ruby screen_capture.rb
+ URL Handling Arbitrary Command Execution'
+comments: false
+categories:
+- screen_capture
+advisory:
+ gem: screen_capture
+ osvdb: 107783
+ url: https://github.com/jamster/screen_capture/blob/master/lib/screen_capture.rb
+ title: Screen Capture Gem for Ruby screen_capture.rb URL Handling Arbitrary Command
+ Execution
+ date: 2014-06-07
+ description: |
+ Screen Capture Gem for Ruby contains a flaw in screen_capture.rb that
+ is triggered when handling input passed via the URL. This may allow
+ a context-dependent attacker to execute arbitrary commands.
+ notes: Never patched
+ related:
+ url:
+ - https://github.com/jamster/screen_capture/blob/master/lib/screen_capture.rb
+ - http://osvdb.org/show/osvdb/107783
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-10075.md b/advisories/_posts/2014-06-30-CVE-2014-10075.md
new file mode 100644
index 00000000..081a3a57
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-10075.md
@@ -0,0 +1,44 @@
+---
+layout: advisory
+title: 'CVE-2014-10075 (karo): karo Gem for Ruby db.rb Metacharacter Handling Remote
+ Command Execution'
+comments: false
+categories:
+- karo
+- rubygems
+- rubygems
+- rubygems
+advisory:
+ gem: karo
+ library: rubygems
+ framework: rubygems
+ platform: rubygems
+ cve: 2014-10075
+ osvdb: 108573
+ ghsa: qfwq-chf4-jvwg
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-10075
+ title: karo Gem for Ruby db.rb Metacharacter Handling Remote Command Execution
+ date: 2014-06-30
+ description: |
+ The karo gem 2.3.8 for Ruby allows Remote command injection via
+ the host field.
+
+ karo Gem for Ruby contains a flaw in db.rb that is triggered when handling
+ metacharacters. This may allow a remote attacker to execute arbitrary
+ commands.
+
+ * CWE-77 - Improper Neutralization of Special Elements used
+ in a Command ('Command Injection')
+
+ * Severity: CRITICAL - CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss_v3: 9.8
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-10075
+ - http://www.vapid.dhs.org/advisories/karo-2.3.8.html
+ - http://www.vapidlabs.com/advisory.php?v=63
+ - http://osvdb.org/show/osvdb/108573
+ - https://github.com/advisories/GHSA-qf67-vmxx-gp4jGHSA-qfwq-chf4-jvwg.json
+ - https://github.com/rahult/karo
+ - https://github.com/rahult/karo/blob/master/CHANGELOG.md
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-4991.md b/advisories/_posts/2014-06-30-CVE-2014-4991.md
new file mode 100644
index 00000000..4c296b66
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-4991.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2014-4991 (codders-dataset): codders-dataset Gem for Ruby lib/dataset/database/mysql.rb
+ and lib/dataset/database/postgresql.rb Process Table Local Plaintext Credential
+ Disclosure'
+comments: false
+categories:
+- codders-dataset
+advisory:
+ gem: codders-dataset
+ cve: 2014-4991
+ osvdb: 108582
+ ghsa: w9vv-fvw8-j6q3
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-4991
+ title: codders-dataset Gem for Ruby lib/dataset/database/mysql.rb and lib/dataset/database/postgresql.rb
+ Process Table Local Plaintext Credential Disclosure
+ date: 2014-06-30
+ description: |
+ "(1) lib/dataset/database/mysql.rb and (2) lib/dataset/database/postgresql.rb
+ in the codders-dataset gem 1.3.2.1 for Ruby place credentials on the mysqldump command
+ line, which allows local users to obtain sensitive information by listing the process."
+ cvss_v3: 7.8
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-4992.md b/advisories/_posts/2014-06-30-CVE-2014-4992.md
new file mode 100644
index 00000000..cdef48fa
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-4992.md
@@ -0,0 +1,21 @@
+---
+layout: advisory
+title: 'CVE-2014-4992 (cap-strap): cap-strap Gem for Ruby Process Table Local Plaintext
+ Credential Disclosure'
+comments: false
+categories:
+- cap-strap
+advisory:
+ gem: cap-strap
+ cve: 2014-4992
+ osvdb: 108574
+ ghsa: pcm6-g2qp-9gw8
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-4992
+ title: cap-strap Gem for Ruby Process Table Local Plaintext Credential Disclosure
+ date: 2014-06-30
+ description: |
+ cap-strap Gem for Ruby contains a flaw that is due to the application
+ exposing credential information in plaintext in the process table listing. This
+ may allow a local attacker to gain access to credential information.
+ cvss_v3: 7.8
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-4993.md b/advisories/_posts/2014-06-30-CVE-2014-4993.md
new file mode 100644
index 00000000..bfe595e6
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-4993.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2014-4993 (backup_checksum): backup_checksum Gem for Ruby /lib/backup/cli/utility.rb
+ Process List Local Plaintext Password Disclosure'
+comments: false
+categories:
+- backup_checksum
+advisory:
+ gem: backup_checksum
+ cve: 2014-4993
+ osvdb: 108569
+ ghsa: wr5j-q359-6vr2
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-4993
+ title: backup_checksum Gem for Ruby /lib/backup/cli/utility.rb Process List Local
+ Plaintext Password Disclosure
+ date: 2014-06-30
+ description: |
+ backup_checksum Gem for Ruby contains a flaw in /lib/backup/cli/utility.rb
+ that is triggered as the program displays password information in plaintext
+ in the process list. This may allow a local attacker to gain access to
+ password information.
+ cvss_v3: 7.8
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-4994.md b/advisories/_posts/2014-06-30-CVE-2014-4994.md
new file mode 100644
index 00000000..c56f29aa
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-4994.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2014-4994 (gyazo): gyazo Gem for Ruby client.rb Metacharacter Handling
+ Remote Command Execution'
+comments: false
+categories:
+- gyazo
+advisory:
+ gem: gyazo
+ cve: 2014-4994
+ osvdb: 108563
+ ghsa: 6x45-86q6-rcmr
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-4994
+ title: gyazo Gem for Ruby client.rb Metacharacter Handling Remote Command Execution
+ date: 2014-06-30
+ description: |
+ gyazo Gem for Ruby contains a flaw in client.rb that is triggered when
+ handling metacharacters. This may allow a remote attacker to execute arbitrary commands.
+ cvss_v3: 5.5
+ patched_versions:
+ - ">= 2.0.0"
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-4995.md b/advisories/_posts/2014-06-30-CVE-2014-4995.md
new file mode 100644
index 00000000..b3a71451
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-4995.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2014-4995 (VladTheEnterprising): VladTheEnterprising Gem for Ruby /tmp/my.cnf.#{target_host}
+ Symlink Multiple Impact'
+comments: false
+categories:
+- VladTheEnterprising
+advisory:
+ gem: VladTheEnterprising
+ cve: 2014-4995
+ osvdb: 108728
+ ghsa: 86cf-g34f-7462
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-4995
+ title: VladTheEnterprising Gem for Ruby /tmp/my.cnf.#{target_host} Symlink Multiple
+ Impact
+ date: 2014-06-30
+ description: |
+ VladTheEnterprising Gem for Ruby contains a flaw as the program creates
+ temporary files insecurely. It is possible for a local attacker to use
+ a symlink attack against the /tmp/my.cnf.#{target_host} file they can
+ overwrite arbitrary files, gain access to the MySQL root password,
+ or inject arbitrary commands.
+ cvss_v3: 7.0
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-4996.md b/advisories/_posts/2014-06-30-CVE-2014-4996.md
new file mode 100644
index 00000000..26da606d
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-4996.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2014-4996 (VladTheEnterprising): VladTheEnterprising Gem for Ruby /tmp/my.cnf.#{target_host}
+ Symlink Multiple Impact'
+comments: false
+categories:
+- VladTheEnterprising
+advisory:
+ gem: VladTheEnterprising
+ cve: 2014-4996
+ osvdb: 108728
+ ghsa: x4vj-279x-qwf2
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-4996
+ title: VladTheEnterprising Gem for Ruby /tmp/my.cnf.#{target_host} Symlink Multiple
+ Impact
+ date: 2014-06-30
+ description: |
+ VladTheEnterprising Gem for Ruby contains a flaw as the program creates
+ temporary files insecurely. It is possible for a local attacker to use
+ a symlink attack against the /tmp/my.cnf.#{target_host} file they can
+ overwrite arbitrary files, gain access to the MySQL root password,
+ or inject arbitrary commands.
+ cvss_v3: 5.5
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-4997.md b/advisories/_posts/2014-06-30-CVE-2014-4997.md
new file mode 100644
index 00000000..061fd41a
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-4997.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2014-4997 (point-cli): point-cli Gem for Ruby /lib/commands/setup.rb Process
+ Table Local Plaintext Credential Disclosure'
+comments: false
+categories:
+- point-cli
+advisory:
+ gem: point-cli
+ cve: 2014-4997
+ osvdb: 108577
+ ghsa: mc8m-x6hf-cw2g
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-4997
+ title: point-cli Gem for Ruby /lib/commands/setup.rb Process Table Local Plaintext
+ Credential Disclosure
+ date: 2014-06-30
+ description: |
+ point-cli Gem for Ruby contains a flaw in /lib/commands/setup.rb that
+ is due to the application exposing credential information in plaintext in the process
+ table. This may allow a local attacker to gain access to credential information.
+ cvss_v3: 7.8
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-4998.md b/advisories/_posts/2014-06-30-CVE-2014-4998.md
new file mode 100644
index 00000000..10ef1259
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-4998.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2014-4998 (lean-ruport): lean-ruport Gem for Ruby /test/tc_database.rb
+ Process Table Local Plaintext MySQL Password Disclosure'
+comments: false
+categories:
+- lean-ruport
+advisory:
+ gem: lean-ruport
+ cve: 2014-4998
+ osvdb: 108581
+ ghsa: 5g7f-p7jg-v6mv
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-4998
+ title: lean-ruport Gem for Ruby /test/tc_database.rb Process Table Local Plaintext
+ MySQL Password Disclosure
+ date: 2014-06-30
+ description: |
+ lean-ruport Gem for Ruby contains a flaw in /test/tc_database.rb that
+ is due to the application exposing MySQL password information in plaintext in the
+ process table. This may allow a local attacker to gain access to MySQL password
+ information.
+ cvss_v3: 7.8
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-4999.md b/advisories/_posts/2014-06-30-CVE-2014-4999.md
new file mode 100644
index 00000000..ac217304
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-4999.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2014-4999 (kajam): kajam Gem for Ruby /dataset/lib/dataset/database/postgresql.rb
+ Process List Local Plaintext Password Disclosure'
+comments: false
+categories:
+- kajam
+advisory:
+ gem: kajam
+ cve: 2014-4999
+ osvdb: 108529
+ ghsa: 4ph7-5c44-pppv
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-4999
+ title: kajam Gem for Ruby /dataset/lib/dataset/database/postgresql.rb Process List
+ Local Plaintext Password Disclosure
+ date: 2014-06-30
+ description: |
+ kajam Gem for Ruby contains a flaw in
+ /dataset/lib/dataset/database/postgresql.rb that is triggered as the program
+ exposes the MySQL or PostgreSQL password in the process list. This may allow
+ a local attacker to gain access to password information.
+ cvss_v3: 7.8
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-5000.md b/advisories/_posts/2014-06-30-CVE-2014-5000.md
new file mode 100644
index 00000000..5533867e
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-5000.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2014-5000 (lawn-login): lawn-login Gem for Ruby /lib/lawn.rb Process Table
+ Local Plaintext Password Disclosure'
+comments: false
+categories:
+- lawn-login
+advisory:
+ gem: lawn-login
+ cve: 2014-5000
+ osvdb: 108576
+ ghsa: rhgq-vv9x-j4p5
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-5000
+ title: lawn-login Gem for Ruby /lib/lawn.rb Process Table Local Plaintext Password
+ Disclosure
+ date: 2014-06-30
+ description: |
+ lawn-login Gem for Ruby contains a flaw in /lib/lawn.rb that is due to
+ the application exposing password information in plaintext in the process table.
+ This may allow a local attacker to gain access to password information.
+ cvss_v3: 7.8
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-5001.md b/advisories/_posts/2014-06-30-CVE-2014-5001.md
new file mode 100644
index 00000000..e7ff5f8b
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-5001.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2014-5001 (kcapifony): kcapifony Gem for Ruby /lib/ksymfony1.rb Process
+ List Local Plaintext Password Disclosure'
+comments: false
+categories:
+- kcapifony
+advisory:
+ gem: kcapifony
+ cve: 2014-5001
+ osvdb: 108571
+ ghsa: 6fcq-3cm2-j3j5
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-5001
+ title: kcapifony Gem for Ruby /lib/ksymfony1.rb Process List Local Plaintext Password
+ Disclosure
+ date: 2014-06-30
+ description: |
+ kcapifony Gem for Ruby contains a flaw in /lib/ksymfony1.rb that is triggered
+ as the program displays password information in plaintext in the process list. This
+ may allow a local attacker to gain access to password information.
+ cvss_v2: 2.1
+ cvss_v3: 7.8
+ notes: Never patched
+ related:
+ url:
+ - http://www.vapid.dhs.org/advisories/kcapifony-2.1.6.html
+ - http://www.vapidlabs.com/advisory.php?v=65
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-5002.md b/advisories/_posts/2014-06-30-CVE-2014-5002.md
new file mode 100644
index 00000000..2835a57a
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-5002.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2014-5002 (lynx): lynx Gem for Ruby command/basic.rb Process Table Local
+ Plaintext Password Disclosure'
+comments: false
+categories:
+- lynx
+advisory:
+ gem: lynx
+ cve: 2014-5002
+ osvdb: 108580
+ ghsa: 94cq-7ccq-cmcm
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-5002
+ title: lynx Gem for Ruby command/basic.rb Process Table Local Plaintext Password
+ Disclosure
+ date: 2014-06-30
+ description: |
+ lynx Gem for Ruby contains a flaw in command/basic.rb that is due to
+ the application exposing password information in plaintext in the process table.
+ This may allow a local attacker to gain access to password information.
+ cvss_v3: 7.8
+ patched_versions:
+ - ">= 1.0.0"
+---
diff --git a/advisories/_posts/2014-06-30-CVE-2014-5003.md b/advisories/_posts/2014-06-30-CVE-2014-5003.md
new file mode 100644
index 00000000..2177980d
--- /dev/null
+++ b/advisories/_posts/2014-06-30-CVE-2014-5003.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2014-5003 (ciborg): ciborg Gem for Ruby default.rb /tmp/perlbrew-installer
+ Local Symlink File Overwrite'
+comments: false
+categories:
+- ciborg
+advisory:
+ gem: ciborg
+ cve: 2014-5003
+ osvdb: 108586
+ ghsa: g982-9r8g-6qxw
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-5003
+ title: ciborg Gem for Ruby default.rb /tmp/perlbrew-installer Local Symlink File
+ Overwrite
+ date: 2014-06-30
+ description: |
+ ciborg Gem for Ruby contains a flaw as default.rb creates temporary files
+ insecurely. It is possible for a local attacker to use a symlink attack against
+ the /tmp/perlbrew-installer file to cause the program to unexpectedly overwrite
+ an arbitrary file.
+ cvss_v3: 5.5
+---
diff --git a/advisories/_posts/2014-06-30-OSVDB-108530.md b/advisories/_posts/2014-06-30-OSVDB-108530.md
new file mode 100644
index 00000000..720f0594
--- /dev/null
+++ b/advisories/_posts/2014-06-30-OSVDB-108530.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'OSVDB-108530 (kajam): kajam Gem for Ruby /dataset/lib/dataset/database/postgresql.rb
+ Metacharacter Handling Remote Command Execution'
+comments: false
+categories:
+- kajam
+advisory:
+ gem: kajam
+ osvdb: 108530
+ url: https://security.snyk.io/vuln/SNYK-RUBY-KAJAM-20171
+ title: kajam Gem for Ruby /dataset/lib/dataset/database/postgresql.rb Metacharacter
+ Handling Remote Command Execution
+ date: 2014-06-30
+ description: |
+ kajam Gem for Ruby contains a flaw in
+ /dataset/lib/dataset/database/postgresql.rb that is triggered
+ when handling metacharacters. This may allow a remote attacker
+ to execute arbitrary commands.
+ notes: Never patched
+ related:
+ url:
+ - https://security.snyk.io/vuln/SNYK-RUBY-KAJAM-20171
+ - https://my.diffend.io/gems/kajam/1.0.3.rc2
+ - http://osvdb.org/show/osvdb/108530
+---
diff --git a/advisories/_posts/2014-06-30-OSVDB-108570.md b/advisories/_posts/2014-06-30-OSVDB-108570.md
new file mode 100644
index 00000000..e661ba40
--- /dev/null
+++ b/advisories/_posts/2014-06-30-OSVDB-108570.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'OSVDB-108570 (backup_checksum): backup_checksum Gem for Ruby /lib/backup/cli/utility.rb
+ Metacharacter Handling Remote Command Execution'
+comments: false
+categories:
+- backup_checksum
+advisory:
+ gem: backup_checksum
+ osvdb: 108570
+ url: https://www.openwall.com/lists/oss-security/2014/07/07/12
+ title: backup_checksum Gem for Ruby /lib/backup/cli/utility.rb Metacharacter Handling
+ Remote Command Execution
+ date: 2014-06-30
+ description: |
+ backup_checksum Gem for Ruby contains a flaw in /lib/backup/cli/utility.rb
+ that is triggered when handling metacharacters. This may allow a remote
+ attacker to execute arbitrary commands.
+ notes: Never patched
+ related:
+ url:
+ - https://www.openwall.com/lists/oss-security/2014/07/07/12
+ - https://my.diffend.io/gems/backup_checksum/3.0.23
+ - https://github.com/backup/backup
+ - http://osvdb.org/show/osvdb/108570
+---
diff --git a/advisories/_posts/2014-06-30-OSVDB-108572.md b/advisories/_posts/2014-06-30-OSVDB-108572.md
new file mode 100644
index 00000000..28f231f9
--- /dev/null
+++ b/advisories/_posts/2014-06-30-OSVDB-108572.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'OSVDB-108572 (kcapifony): kcapifony Gem for Ruby /lib/ksymfony1.rb Metacharacter
+ Handling Remote Command Execution'
+comments: false
+categories:
+- kcapifony
+advisory:
+ gem: kcapifony
+ osvdb: 108572
+ url: https://www.mend.io/vulnerability-database/WS-2014-0019
+ title: kcapifony Gem for Ruby /lib/ksymfony1.rb Metacharacter Handling Remote Command
+ Execution
+ date: 2014-06-30
+ description: |
+ kcapifony Gem for Ruby contains a flaw in /lib/ksymfony1.rb that
+ is triggered when handling metacharacters. This may allow a remote
+ attacker to execute arbitrary commands.
+ notes: Never patched
+ related:
+ url:
+ - https://www.mend.io/vulnerability-database/WS-2014-0019
+ - https://github.com/Kunstmaan/kCapifony/blob/master/lib/ksymfony1.rb
+ - http://www.vapid.dhs.org/advisories/kcapifony-2.1.6.html
+ - http://www.vapidlabs.com/advisory.php?v=65
+ - http://osvdb.org/show/osvdb/108572
+---
diff --git a/advisories/_posts/2014-06-30-OSVDB-108573.md b/advisories/_posts/2014-06-30-OSVDB-108573.md
new file mode 100644
index 00000000..aa26d62d
--- /dev/null
+++ b/advisories/_posts/2014-06-30-OSVDB-108573.md
@@ -0,0 +1,18 @@
+---
+layout: advisory
+title: 'OSVDB-108573 (karo): karo Gem for Ruby db.rb Metacharacter Handling Remote
+ Command Execution'
+comments: false
+categories:
+- karo
+advisory:
+ gem: karo
+ osvdb: 108573
+ url: http://osvdb.org/show/osvdb/108573
+ title: karo Gem for Ruby db.rb Metacharacter Handling Remote Command Execution
+ date: 2014-06-30
+ description: |
+ karo Gem for Ruby contains a flaw in db.rb that is triggered when handling
+ metacharacters. This may allow a remote attacker to execute arbitrary
+ commands.
+---
diff --git a/advisories/_posts/2014-06-30-OSVDB-108575.md b/advisories/_posts/2014-06-30-OSVDB-108575.md
new file mode 100644
index 00000000..091fb562
--- /dev/null
+++ b/advisories/_posts/2014-06-30-OSVDB-108575.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'OSVDB-108575 (cap-strap): cap-strap Gem for Ruby Hardcoded Password Crypt
+ Hash Salt Weakness'
+comments: false
+categories:
+- cap-strap
+advisory:
+ gem: cap-strap
+ osvdb: 108575
+ url: https://www.openwall.com/lists/oss-security/2014/07/07/9
+ title: cap-strap Gem for Ruby Hardcoded Password Crypt Hash Salt Weakness
+ date: 2014-06-30
+ description: |
+ cap-strap Gem for Ruby contains a flaw that is due to the application
+ using a hardcoded default 'sa' salt for password encryption. This may
+ allow a local attacker to more easily decrypt passwords.
+ notes: Never patched
+ related:
+ url:
+ - https://www.openwall.com/lists/oss-security/2014/07/07/9
+ - https://github.com/substantial/cap-strap
+ - http://www.vapid.dhs.org/advisories/cap-strap-0.1.5.html
+ - http://www.vapidlabs.com/advisory.php?v=27
+ - http://osvdb.org/show/osvdb/108575
+---
diff --git a/advisories/_posts/2014-06-30-OSVDB-108579.md b/advisories/_posts/2014-06-30-OSVDB-108579.md
new file mode 100644
index 00000000..a89fd571
--- /dev/null
+++ b/advisories/_posts/2014-06-30-OSVDB-108579.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'OSVDB-108579 (lynx): lynx Gem for Ruby lib/lynx/pipe/run.rb Remote Command
+ Execution'
+comments: false
+categories:
+- lynx
+advisory:
+ gem: lynx
+ osvdb: 108579
+ url: https://www.openwall.com/lists/oss-security/2014/07/07/23
+ title: lynx Gem for Ruby lib/lynx/pipe/run.rb Remote Command Execution
+ date: 2014-06-30
+ description: |
+ lynx Gem for Ruby contains a flaw in lib/lynx/pipe/run.rb that
+ may allow a remote attacker to execute arbitrary commands.
+ notes: Never patched
+ related:
+ url:
+ - https://www.openwall.com/lists/oss-security/2014/07/07/23
+ - https://security.snyk.io/vuln/SNYK-RUBY-LYNX-20160
+ - https://github.com/panthomakos/lynx/blob/master/lib/lynx/pipe/run.rb
+ - http://osvdb.org/show/osvdb/108579
+---
diff --git a/advisories/_posts/2014-06-30-OSVDB-108585.md b/advisories/_posts/2014-06-30-OSVDB-108585.md
new file mode 100644
index 00000000..d9de9ee1
--- /dev/null
+++ b/advisories/_posts/2014-06-30-OSVDB-108585.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'OSVDB-108585 (lingq): lingq Gem for Ruby client.rb Metacharacter Handling
+ Remote Command Execution'
+comments: false
+categories:
+- lingq
+advisory:
+ gem: lingq
+ osvdb: 108585
+ url: https://www.versioneye.com/Ruby/lingq/0.3.1
+ title: lingq Gem for Ruby client.rb Metacharacter Handling Remote Command Execution
+ date: 2014-06-30
+ description: |
+ lingq Gem for Ruby contains a flaw in client.rb that is triggered
+ when handling metacharacters. This may allow a remote attacker
+ to execute arbitrary commands.
+ notes: Never patched
+ related:
+ url:
+ - https://www.versioneye.com/Ruby/lingq/0.3.1
+ - http://www.vapid.dhs.org/advisories/lingq-0.3.1.html
+ - http://www.vapidlabs.com/advisory.php?v=71
+ - http://osvdb.org/show/osvdb/108585
+---
diff --git a/advisories/_posts/2014-06-30-OSVDB-108593.md b/advisories/_posts/2014-06-30-OSVDB-108593.md
new file mode 100644
index 00000000..dfd4d873
--- /dev/null
+++ b/advisories/_posts/2014-06-30-OSVDB-108593.md
@@ -0,0 +1,31 @@
+---
+layout: advisory
+title: 'OSVDB-108593 (kompanee-recipes): kompanee-recipes Gem for Ruby /lib/kompanee-recipes/heroku.rb
+ Multiple Variable Handling Remote Command Execution Weakness'
+comments: false
+categories:
+- kompanee-recipes
+advisory:
+ gem: kompanee-recipes
+ osvdb: 108593
+ url: https://www.openwall.com/lists/oss-security/2014/07/07/17
+ title: kompanee-recipes Gem for Ruby /lib/kompanee-recipes/heroku.rb Multiple Variable
+ Handling Remote Command Execution Weakness
+ date: 2014-06-30
+ description: |
+ kompanee-recipes Gem for Ruby contains a flaw in
+ /lib/kompanee-recipes/heroku.rb that is triggered when handling shell
+ metacharacters passed via the 'password', 'user', 'deploy_name', and
+ 'application' variables. This may allow a remote attacker to execute
+ arbitrary commands.
+ notes: Never patched
+ related:
+ url:
+ - https://www.openwall.com/lists/oss-security/2014/07/07/17
+ - https://seclists.org/oss-sec/2014/q3/162
+ - https://www.mend.io/vulnerability-database/WS-2014-0025
+ - https://security.snyk.io/vuln/SNYK-RUBY-KOMPANEERECIPES-20177
+ - http://www.vapid.dhs.org/advisories/kompanee-recipes-0.1.4.html
+ - http://www.vapidlabs.com/advisory.php?v=67
+ - http://osvdb.org/show/osvdb/108593
+---
diff --git a/advisories/_posts/2014-06-30-OSVDB-108594.md b/advisories/_posts/2014-06-30-OSVDB-108594.md
new file mode 100644
index 00000000..44ec6e6a
--- /dev/null
+++ b/advisories/_posts/2014-06-30-OSVDB-108594.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'OSVDB-108594 (gnms): gnms Gem for Ruby /lib/cmd_parse.rb ip Variable Shell
+ Metacharacter Handling Remote Command Injection'
+comments: false
+categories:
+- gnms
+advisory:
+ gem: gnms
+ osvdb: 108594
+ url: http://www.vapidlabs.com/advisories/gnms-2.1.1.html
+ title: gnms Gem for Ruby /lib/cmd_parse.rb ip Variable Shell Metacharacter Handling
+ Remote Command Injection
+ date: 2014-06-30
+ description: |
+ gnms Gem for Ruby contains a flaw in /lib/cmd_parse.rb that is triggered
+ when handling shell metacharacters passed via the 'ip' variable.
+ This may allow a remote attacker to inject arbitrary commands.
+ notes: Never patched
+ related:
+ url:
+ - http://www.vapidlabs.com/advisories/gnms-2.1.1.html
+ - http://www.vapidlabs.com/advisory.php?v=55
+ - http://osvdb.org/show/osvdb/108594
+---
diff --git a/advisories/_posts/2014-07-02-CVE-2014-3482.md b/advisories/_posts/2014-07-02-CVE-2014-3482.md
new file mode 100644
index 00000000..56e696b4
--- /dev/null
+++ b/advisories/_posts/2014-07-02-CVE-2014-3482.md
@@ -0,0 +1,31 @@
+---
+layout: advisory
+title: 'CVE-2014-3482 (activerecord): CVE-2014-3482 rubygem-activerecord: SQL injection
+ vulnerability in ''bitstring'' quoting'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2014-3482
+ osvdb: 108664
+ ghsa: mhwp-qhpc-h3jm
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-3482
+ title: 'CVE-2014-3482 rubygem-activerecord: SQL injection vulnerability in ''bitstring''
+ quoting'
+ date: 2014-07-02
+ description: |
+ SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb
+ in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before
+ 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper
+ bitstring quoting. It was discovered that Active Record did not properly quote values
+ of the bitstring type attributes when using the PostgreSQL database adapter. A remote
+ attacker could possibly use this flaw to conduct an SQL injection attack against
+ applications using Active Record.
+ unaffected_versions:
+ - ">= 4.0.0"
+ patched_versions:
+ - "~> 3.2.19"
+---
diff --git a/advisories/_posts/2014-07-02-CVE-2014-3483.md b/advisories/_posts/2014-07-02-CVE-2014-3483.md
new file mode 100644
index 00000000..698c457d
--- /dev/null
+++ b/advisories/_posts/2014-07-02-CVE-2014-3483.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2014-3483 (activerecord): CVE-2014-3483 rubygem-activerecord: SQL injection
+ vulnerability in ''range'' quoting'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2014-3483
+ osvdb: 108665
+ ghsa: r8fh-hq2p-7qhq
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-3483
+ title: 'CVE-2014-3483 rubygem-activerecord: SQL injection vulnerability in ''range''
+ quoting'
+ date: 2014-07-02
+ description: |
+ SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb
+ in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and
+ 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by
+ leveraging improper range quoting. It was discovered that Active Record did not
+ properly quote values of the range type attributes when using the PostgreSQL database
+ adapter. A remote attacker could possibly use this flaw to conduct an SQL injection
+ attack against applications using Active Record.
+ unaffected_versions:
+ - "< 4.0.0"
+ patched_versions:
+ - "~> 4.0.7"
+ - ">= 4.1.3"
+---
diff --git a/advisories/_posts/2014-07-09-CVE-2014-5004.md b/advisories/_posts/2014-07-09-CVE-2014-5004.md
new file mode 100644
index 00000000..15d6356b
--- /dev/null
+++ b/advisories/_posts/2014-07-09-CVE-2014-5004.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2014-5004 (brbackup): brbackup Gem for Ruby Process List Local Plaintext
+ Password Disclosure'
+comments: false
+categories:
+- brbackup
+advisory:
+ gem: brbackup
+ cve: 2014-5004
+ osvdb: 108901
+ ghsa: vqcm-7f7f-r539
+ url: http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html
+ title: brbackup Gem for Ruby Process List Local Plaintext Password Disclosure
+ date: 2014-07-09
+ description: |
+ brbackup Gem for Ruby contains a flaw that is due to the program exposing
+ password information in plaintext in the process list. This may allow a
+ local attacker to gain access to password information.
+ cvss_v2: 2.1
+ cvss_v3: 7.8
+ notes: Never patched
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-5004
+ - http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html
+ - http://www.vapidlabs.com/advisory.php?v=25
+ - http://www.openwall.com/lists/oss-security/2014/07/10/6
+ - http://www.openwall.com/lists/oss-security/2014/07/17/5
+ - http://www.securityfocus.com/bid/68506
+ - https://web.archive.org/web/20200229055655/https://www.securityfocus.com/bid/68506/
+---
diff --git a/advisories/_posts/2014-07-09-OSVDB-108899.md b/advisories/_posts/2014-07-09-OSVDB-108899.md
new file mode 100644
index 00000000..2eb2060b
--- /dev/null
+++ b/advisories/_posts/2014-07-09-OSVDB-108899.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'OSVDB-108899 (brbackup): brbackup Gem for Ruby /lib/brbackup.rb name Parameter
+ SQL Injection'
+comments: false
+categories:
+- brbackup
+advisory:
+ gem: brbackup
+ osvdb: 108899
+ url: https://www.openwall.com/lists/oss-security/2014/07/10/6
+ title: brbackup Gem for Ruby /lib/brbackup.rb name Parameter SQL Injection
+ date: 2014-07-09
+ description: |
+ brbackup Gem for Ruby contains a flaw that may allow carrying out an SQL
+ injection attack. The issue is due to the /lib/brbackup.rb script not
+ properly sanitizing user-supplied input to the 'name' parameter. This may
+ allow a remote attacker to inject or manipulate SQL queries in the back-end
+ database, allowing for the manipulation or disclosure of arbitrary data.
+ notes: Never patched
+ related:
+ url:
+ - https://www.openwall.com/lists/oss-security/2014/07/10/6
+ - https://raw.githubusercontent.com/codesake/codesake-dawn/master/Roadmap.md
+ - https://github.com/tongueroo/brbackup/blob/master/lib/brbackup.rb
+ - http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html
+ - http://www.vapidlabs.com/advisory.php?v=25
+ - http://osvdb.org/show/osvdb/108899
+---
diff --git a/advisories/_posts/2014-07-09-OSVDB-108900.md b/advisories/_posts/2014-07-09-OSVDB-108900.md
new file mode 100644
index 00000000..abb5a05c
--- /dev/null
+++ b/advisories/_posts/2014-07-09-OSVDB-108900.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'OSVDB-108900 (brbackup): brbackup Gem for Ruby dbuser Variable Shell Metacharacter
+ Injection Remote Command Execution'
+comments: false
+categories:
+- brbackup
+advisory:
+ gem: brbackup
+ osvdb: 108900
+ url: https://www.openwall.com/lists/oss-security/2014/07/10/6
+ title: brbackup Gem for Ruby dbuser Variable Shell Metacharacter Injection Remote
+ Command Execution
+ date: 2014-07-09
+ description: |
+ brbackup Gem for Ruby contains a flaw that is triggered as input passed
+ via the 'dbuser' variable is not properly sanitized. This may allow a
+ remote attacker to inject shell metacharacters and execute arbitrary
+ commands.
+ notes: Never patched
+ related:
+ url:
+ - https://www.openwall.com/lists/oss-security/2014/07/10/6
+ - https://raw.githubusercontent.com/codesake/codesake-dawn/master/Roadmap.md
+ - http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html
+ - http://www.vapidlabs.com/advisory.php?v=25
+ - http://osvdb.org/show/osvdb/108900
+---
diff --git a/advisories/_posts/2014-08-13-CVE-2013-0334.md b/advisories/_posts/2014-08-13-CVE-2013-0334.md
new file mode 100644
index 00000000..6fc45283
--- /dev/null
+++ b/advisories/_posts/2014-08-13-CVE-2013-0334.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'CVE-2013-0334 (bundler): CVE-2013-0334 rubygem-bundler: ''bundle install''
+ may install a gem from a source other than expected'
+comments: false
+categories:
+- bundler
+advisory:
+ gem: bundler
+ cve: 2013-0334
+ osvdb: 110004
+ ghsa: 49jx-9cmc-xjxm
+ url: https://nvd.nist.gov/vuln/detail/CVE-2013-0334
+ title: 'CVE-2013-0334 rubygem-bundler: ''bundle install'' may install a gem from
+ a source other than expected'
+ date: 2014-08-13
+ description: |
+ Bundler before 1.7, when multiple top-level source lines are used, allows
+ remote attackers to install arbitrary gems by creating a gem with the same name
+ as another gem in a different source. A flaw was found in the way Bundler handled
+ gems available from multiple sources. An attacker with access to one of the sources
+ could create a malicious gem with the same name, which they could then use to trick
+ a user into installing, potentially resulting in execution of code from the attacker-supplied
+ malicious gem.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 1.7.0"
+---
diff --git a/advisories/_posts/2014-08-18-CVE-2014-3514.md b/advisories/_posts/2014-08-18-CVE-2014-3514.md
new file mode 100644
index 00000000..2d6defdb
--- /dev/null
+++ b/advisories/_posts/2014-08-18-CVE-2014-3514.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2014-3514 (activerecord): Data Injection Vulnerability in Active Record'
+comments: false
+categories:
+- activerecord
+- rails
+advisory:
+ gem: activerecord
+ framework: rails
+ cve: 2014-3514
+ ghsa: 9rf5-jm6f-2fmm
+ url: https://groups.google.com/forum/#!msg/rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ
+ title: Data Injection Vulnerability in Active Record
+ date: 2014-08-18
+ description: |
+ The create_with functionality in Active Record was implemented incorrectly
+ and completely bypasses the strong parameters protection. Applications which pass
+ user-controlled values to create_with could allow attackers to set arbitrary attributes
+ on models.
+ cvss_v2: 8.7
+ unaffected_versions:
+ - "< 4.0.0"
+ patched_versions:
+ - "~> 4.0.9"
+ - ">= 4.1.5"
+---
diff --git a/advisories/_posts/2014-08-22-CVE-2014-5441.md b/advisories/_posts/2014-08-22-CVE-2014-5441.md
new file mode 100644
index 00000000..a3f6befc
--- /dev/null
+++ b/advisories/_posts/2014-08-22-CVE-2014-5441.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2014-5441 (fat_free_crm): Fat Free CRM Gem contains a javascript cross-site
+ scripting (XSS) vulnerability'
+comments: false
+categories:
+- fat_free_crm
+advisory:
+ gem: fat_free_crm
+ cve: 2014-5441
+ osvdb: 110420
+ ghsa: wcfx-3m6v-4frg
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-5441
+ title: Fat Free CRM Gem contains a javascript cross-site scripting (XSS) vulnerability
+ date: 2014-08-22
+ description: |
+ Fat Free CRM Gem contains a javascript cross-site scripting (XSS)
+ vulnerability. When a user is created/updated using a specifically
+ crafted username, first name or last name, it is possible for
+ arbitrary javascript to be executed on all Fat Free CRM pages.
+ This code would be executed for all logged in users.
+ cvss_v2: 4.3
+ unaffected_versions:
+ - "<= 0.11.0"
+ patched_versions:
+ - ">= 0.13.3"
+---
diff --git a/advisories/_posts/2014-08-25-OSVDB-110439.md b/advisories/_posts/2014-08-25-OSVDB-110439.md
new file mode 100644
index 00000000..a2150f26
--- /dev/null
+++ b/advisories/_posts/2014-08-25-OSVDB-110439.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'OSVDB-110439 (dragonfly): Dragonfly Gem for Ruby Image Uploading & Processing
+ Remote Command Execution'
+comments: false
+categories:
+- dragonfly
+advisory:
+ gem: dragonfly
+ osvdb: 110439
+ url: https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20193
+ title: Dragonfly Gem for Ruby Image Uploading & Processing Remote Command Execution
+ date: 2014-08-25
+ description: |
+ Dragonfly Gem for Ruby contains a flaw in Uploading & Processing
+ that is due to the gem failing to restrict arbitrary commands to
+ imagemagicks convert. This may allow a remote attacker to gain
+ read/write access to the filesystem and execute arbitrary commands.
+ patched_versions:
+ - ">= 1.0.7"
+ related:
+ url:
+ - https://github.com/markevans/dragonfly/compare/v1.0.6...v1.0.7
+ - https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20193
+ - https://www.mend.io/vulnerability-database/WS-2014-0016
+ - http://osvdb.org/show/osvdb/110439
+---
diff --git a/advisories/_posts/2014-09-04-OSVDB-110796.md b/advisories/_posts/2014-09-04-OSVDB-110796.md
new file mode 100644
index 00000000..f7391656
--- /dev/null
+++ b/advisories/_posts/2014-09-04-OSVDB-110796.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'OSVDB-110796 (flavour_saver): FlavourSaver handlebars helper remote code execution.'
+comments: false
+categories:
+- flavour_saver
+advisory:
+ gem: flavour_saver
+ osvdb: 110796
+ url: https://security.snyk.io/vuln/SNYK-RUBY-FLAVOURSAVER-5457859
+ title: FlavourSaver handlebars helper remote code execution.
+ date: 2014-09-04
+ description: |
+ FlavourSaver contains a flaw in helper method dispatch where it uses
+ Kernel::send to call helpers without checking that they are defined
+ within the template context first. This allows expressions such as
+ {{system "ls"}} or {{eval "puts 1 + 1"}} to be executed.
+ patched_versions:
+ - ">= 0.3.3"
+ related:
+ url:
+ - https://github.com/FlavourSaver/FlavourSaver/compare/v0.3.2...v0.3.3
+ - https://github.com/FlavourSaver/FlavourSaver/commit/04a8ff444a9a9668a75b01b20b4974d398087a64
+ - https://raw.githubusercontent.com/codesake/codesake-dawn/master/Roadmap.md
+ - https://github.com/slowmistio/dawnscanner-analysis-security-scanner-for-ruby-/blob/master/Roadmap.md
+ - https://security.snyk.io/vuln/SNYK-RUBY-FLAVOURSAVER-5457859
+ - http://osvdb.org/show/osvdb/110796
+---
diff --git a/advisories/_posts/2014-09-25-OSVDB-112683.md b/advisories/_posts/2014-09-25-OSVDB-112683.md
new file mode 100644
index 00000000..0ed84a22
--- /dev/null
+++ b/advisories/_posts/2014-09-25-OSVDB-112683.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'OSVDB-112683 (as): as Gem for Ruby Process List Local Plaintext Credentials
+ Disclosure'
+comments: false
+categories:
+- as
+advisory:
+ gem: as
+ osvdb: 112683
+ url: https://security.snyk.io/vuln/SNYK-RUBY-AS-20195
+ title: as Gem for Ruby Process List Local Plaintext Credentials Disclosure
+ date: 2014-09-25
+ description: |
+ as Gem for Ruby contains a flaw that is due to the program displaying
+ credential information in plaintext in the process list. This may
+ allow a local attacker to gain access to credential information.
+ notes: Never patched
+ related:
+ url:
+ - https://security.snyk.io/vuln/SNYK-RUBY-AS-20195
+ - http://www.vapid.dhs.org/advisories/as-v1.0.html
+ - http://www.vapidlabs.com/advisory.php?v=17
+ - http://osvdb.org/show/osvdb/112683
+---
diff --git a/advisories/_posts/2014-09-27-CVE-2014-10077.md b/advisories/_posts/2014-09-27-CVE-2014-10077.md
new file mode 100644
index 00000000..fc5b48d6
--- /dev/null
+++ b/advisories/_posts/2014-09-27-CVE-2014-10077.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'CVE-2014-10077 (i18n): i18n Gem for Ruby lib/i18n/core_ext/hash.rb Hash#slice()
+ Function Hash Handling DoS'
+comments: false
+categories:
+- i18n
+advisory:
+ gem: i18n
+ cve: 2014-10077
+ ghsa: 34hf-g744-jw64
+ url: https://github.com/svenfuchs/i18n/pull/289
+ title: i18n Gem for Ruby lib/i18n/core_ext/hash.rb Hash#slice() Function Hash Handling
+ DoS
+ date: 2014-09-27
+ description: |
+ i18n Gem for Ruby contains a flaw in the Hash#slice() function in
+ lib/i18n/core_ext/hash.rb that is triggered when calling a hash when
+ :some_key is in keep_keys but not in the hash. This may allow an attacker
+ to cause the program to crash.
+ cvss_v3: 7.5
+ patched_versions:
+ - ">= 0.8.0"
+ related:
+ osvdb:
+ - 121500
+---
diff --git a/advisories/_posts/2014-09-29-OSVDB-112346.md b/advisories/_posts/2014-09-29-OSVDB-112346.md
new file mode 100644
index 00000000..f00bca7a
--- /dev/null
+++ b/advisories/_posts/2014-09-29-OSVDB-112346.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'OSVDB-112346 (web-console): Web Console Gem for Ruby contains an unspecified
+ flaw'
+comments: false
+categories:
+- web-console
+advisory:
+ gem: web-console
+ osvdb: 112346
+ url: https://my.diffend.io/gems/web-console/versions/2.0.0.beta3
+ title: Web Console Gem for Ruby contains an unspecified flaw
+ date: 2014-09-29
+ description: |
+ The Web Console Gem for Ruby on Rails contains an unspecified
+ flaw that may allow an attacker to have an unspecified impact.
+ No further details have been provided by the vendor.
+ patched_versions:
+ - ">= 2.0.0.beta4"
+ related:
+ url:
+ - https://github.com/rails/web-console/compare/v2.0.0.beta3...v2.0.0.beta4
+ - https://my.diffend.io/gems/web-console/versions/2.0.0.beta3
+ - https://github.com/slowmistio/dawnscanner-analysis-security-scanner-for-ruby-/blob/master/Roadmap.md
+ - http://www.osvdb.org/show/osvdb/112346
+---
diff --git a/advisories/_posts/2014-10-13-OSVDB-126330.md b/advisories/_posts/2014-10-13-OSVDB-126330.md
new file mode 100644
index 00000000..4e35f50f
--- /dev/null
+++ b/advisories/_posts/2014-10-13-OSVDB-126330.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'OSVDB-126330 (sidekiq-pro): Sidekiq Pro Gem for Ruby web/views/batch{,es}.erb
+ Description Element XSS'
+comments: false
+categories:
+- sidekiq-pro
+advisory:
+ gem: sidekiq-pro
+ osvdb: 126330
+ url: https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQPRO-20197
+ title: Sidekiq Pro Gem for Ruby web/views/batch{,es}.erb Description Element XSS
+ date: 2014-10-13
+ description: 'XSS via batch description in Sidekiq::Web
+
+ '
+ patched_versions:
+ - ">= 1.9.1"
+ related:
+ url:
+ - https://github.com/mperham/sidekiq/commit/99b12fb50fe244c5a317f03f1bed9b333ec56ebe
+ - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQPRO-20197
+---
diff --git a/advisories/_posts/2014-10-30-CVE-2014-7818.md b/advisories/_posts/2014-10-30-CVE-2014-7818.md
new file mode 100644
index 00000000..d9d1dec7
--- /dev/null
+++ b/advisories/_posts/2014-10-30-CVE-2014-7818.md
@@ -0,0 +1,30 @@
+---
+layout: advisory
+title: 'CVE-2014-7818 (actionpack): Arbitrary file existence disclosure in Action
+ Pack'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2014-7818
+ ghsa: 29gr-w57f-rpfw
+ url: https://groups.google.com/forum/#!topic/rubyonrails-security/dCp7duBiQgo
+ title: Arbitrary file existence disclosure in Action Pack
+ date: 2014-10-30
+ description: |
+ Specially crafted requests can be used to determine whether a file exists on
+ the filesystem that is outside the Rails application's root directory. The
+ files will not be served, but attackers can determine whether or not the file
+ exists.
+ cvss_v2: 4.3
+ unaffected_versions:
+ - "< 3.0.0"
+ patched_versions:
+ - "~> 3.2.20"
+ - "~> 4.0.11"
+ - "~> 4.1.7"
+ - ">= 4.2.0.beta3"
+---
diff --git a/advisories/_posts/2014-10-30-CVE-2014-7819.md b/advisories/_posts/2014-10-30-CVE-2014-7819.md
new file mode 100644
index 00000000..90083454
--- /dev/null
+++ b/advisories/_posts/2014-10-30-CVE-2014-7819.md
@@ -0,0 +1,39 @@
+---
+layout: advisory
+title: 'CVE-2014-7819 (sprockets): CVE-2014-7819 rubygem-sprockets: arbitrary file
+ existence disclosure'
+comments: false
+categories:
+- sprockets
+advisory:
+ gem: sprockets
+ cve: 2014-7819
+ osvdb: 113965
+ ghsa: 33pp-3763-mrfp
+ url: https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY
+ title: 'CVE-2014-7819 rubygem-sprockets: arbitrary file existence disclosure'
+ date: 2014-10-30
+ description: |
+ Multiple directory traversal vulnerabilities in server.rb in Sprockets
+ before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x
+ before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3,
+ 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3,
+ and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow
+ remote attackers to determine the existence of files outside the application root
+ via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
+ cvss_v2: 5.0
+ patched_versions:
+ - "~> 2.0.5"
+ - "~> 2.1.4"
+ - "~> 2.2.3"
+ - "~> 2.3.3"
+ - "~> 2.4.6"
+ - "~> 2.5.1"
+ - "~> 2.7.1"
+ - "~> 2.8.3"
+ - "~> 2.9.4"
+ - "~> 2.10.2"
+ - "~> 2.11.3"
+ - "~> 2.12.3"
+ - ">= 3.0.0.beta.3"
+---
diff --git a/advisories/_posts/2014-11-17-CVE-2014-7829.md b/advisories/_posts/2014-11-17-CVE-2014-7829.md
new file mode 100644
index 00000000..eef47bf2
--- /dev/null
+++ b/advisories/_posts/2014-11-17-CVE-2014-7829.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2014-7829 (actionpack): Arbitrary file existence disclosure in Action
+ Pack'
+comments: false
+categories:
+- actionpack
+- rails
+advisory:
+ gem: actionpack
+ framework: rails
+ cve: 2014-7829
+ ghsa: h56m-vwxc-3qpw
+ url: https://groups.google.com/forum/#!topic/rubyonrails-security/rMTQy4oRCGk
+ title: Arbitrary file existence disclosure in Action Pack
+ date: 2014-11-17
+ description: |
+ Specially crafted requests can be used to determine whether a file exists on
+ the filesystem that is outside the Rails application's root directory. The
+ files will not be served, but attackers can determine whether or not the file
+ exists. This vulnerability is very similar to CVE-2014-7818, but the
+ specially crafted string is slightly different.
+ cvss_v2: 5.0
+ unaffected_versions:
+ - "< 3.0.0"
+ patched_versions:
+ - "~> 3.2.21"
+ - "~> 4.0.11.1"
+ - "~> 4.0.12"
+ - "~> 4.1.7.1"
+ - ">= 4.1.8"
+---
diff --git a/advisories/_posts/2014-12-04-CVE-2014-9489.md b/advisories/_posts/2014-12-04-CVE-2014-9489.md
new file mode 100644
index 00000000..d53cde8b
--- /dev/null
+++ b/advisories/_posts/2014-12-04-CVE-2014-9489.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'CVE-2014-9489 (gollum-grit_adapter): gollum-grit_adapter Search Functionality
+ Allows Arbitrary Command Execution'
+comments: false
+categories:
+- gollum-grit_adapter
+advisory:
+ gem: gollum-grit_adapter
+ cve: 2014-9489
+ url: https://github.com/gollum/gollum/issues/913
+ title: gollum-grit_adapter Search Functionality Allows Arbitrary Command Execution
+ date: 2014-12-04
+ description: |
+ The gollum-grit_adapter gem contains a flaw that can allow arbitrary
+ command execution.
+
+ Grit implements its search functionality by shelling out to `git grep`. In
+ turn, `git grep` takes a `-O` or `--open-files-in-pages` option that will
+ pipe the results of `grep` to an arbitrary process. By failing to properly
+ sanitize user input search parameters, an attacker can thus perform command
+ execution.
+
+ Note that the grep result must find the string 'master' (or
+ whatever is the default branch that gollum uses) in any of the wiki's
+ documents for this to succeed.
+ patched_versions:
+ - ">= 0.1.1"
+---
diff --git a/advisories/_posts/2014-12-08-CVE-2014-9490.md b/advisories/_posts/2014-12-08-CVE-2014-9490.md
new file mode 100644
index 00000000..36484168
--- /dev/null
+++ b/advisories/_posts/2014-12-08-CVE-2014-9490.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2014-9490 (sentry-raven): sentry-raven Gem for Ruby contains a flaw that
+ can result in a denial of service'
+comments: false
+categories:
+- sentry-raven
+advisory:
+ gem: sentry-raven
+ cve: 2014-9490
+ osvdb: 115654
+ ghsa: c9c5-9fpr-m882
+ url: https://nvd.nist.gov/vuln/detail/CVE-2014-9490
+ title: sentry-raven Gem for Ruby contains a flaw that can result in a denial of
+ service
+ date: 2014-12-08
+ description: |
+ Sentry raven-ruby contains a flaw in the lib/raven/okjson.rb script that
+ is triggered when large numeric values are stored as an exponent or in scientific
+ notation. With a specially crafted request, an attacker can cause the software to
+ consume excessive resources resulting in a denial of service.
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 0.12.2"
+---
diff --git a/advisories/_posts/2014-12-18-CVE-2014-8144.md b/advisories/_posts/2014-12-18-CVE-2014-8144.md
new file mode 100644
index 00000000..dc4046be
--- /dev/null
+++ b/advisories/_posts/2014-12-18-CVE-2014-8144.md
@@ -0,0 +1,30 @@
+---
+layout: advisory
+title: 'CVE-2014-8144 (doorkeeper): Cross-site request forgery (CSRF) vulnerability
+ in doorkeeper 1.4.0 and earlier.'
+comments: false
+categories:
+- doorkeeper
+advisory:
+ gem: doorkeeper
+ cve: 2014-8144
+ osvdb: 116010
+ ghsa: 685w-vc84-wxcx
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/5_VqJtNc8jw
+ title: Cross-site request forgery (CSRF) vulnerability in doorkeeper 1.4.0 and earlier.
+ date: 2014-12-18
+ description: |
+ Cross-site request forgery (CSRF) vulnerability in doorkeeper 1.4.0
+ and earlier allows remote attackers to hijack the user's OAuth
+ autorization code. This vulnerability has been assigned the CVE
+ identifier CVE-2014-8144.
+
+ Doorkeeper's endpoints didn't have CSRF protection. Any HTML document
+ on the Internet can then read a user's authorization code with
+ arbitrary scope from any Doorkeeper-compatible Rails app you are
+ logged in.
+ cvss_v2: 6.8
+ patched_versions:
+ - "~> 1.4.1"
+ - ">= 2.0.0"
+---
diff --git a/advisories/_posts/2015-02-03-OSVDB-117903.md b/advisories/_posts/2015-02-03-OSVDB-117903.md
new file mode 100644
index 00000000..b558a121
--- /dev/null
+++ b/advisories/_posts/2015-02-03-OSVDB-117903.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'OSVDB-117903 (ruby-saml): Ruby-Saml Gem is vulnerable to arbitrary code execution'
+comments: false
+categories:
+- ruby-saml
+advisory:
+ gem: ruby-saml
+ osvdb: 117903
+ url: https://advisories.dxw.com/advisories/publicly-exploitable-command-injection-in-ruby-saml-0-7-2-library-can-root-the-host
+ title: Ruby-Saml Gem is vulnerable to arbitrary code execution
+ date: 2015-02-03
+ description: |
+ ruby-saml contains a flaw that is triggered as the URI value of a
+ SAML response is not properly sanitized through a prepared statement.
+ This may allow a remote attacker to execute arbitrary shell commands
+ on the host machine.
+ patched_versions:
+ - ">= 0.8.2"
+ related:
+ url:
+ - https://advisories.dxw.com/advisories/publicly-exploitable-command-injection-in-ruby-saml-0-7-2-library-can-root-the-host
+ - https://seclists.org/oss-sec/2015/q3/282
+ - https://github.com/SAML-Toolkits/ruby-saml/pull/225#issuecomment-120084288
+ - https://github.com/SAML-Toolkits/ruby-saml/commit/1b4e3dd6d2d44efa629144b2180842456bfb2a0f#diff-661b9d9743a3ff77661f224c6191165cL242
+ - https://www.mend.io/vulnerability-database/WS-2015-0040
+ - http://www.osvdb.org/show/osvdb/117903
+---
diff --git a/advisories/_posts/2015-02-10-CVE-2015-1426.md b/advisories/_posts/2015-02-10-CVE-2015-1426.md
new file mode 100644
index 00000000..37c53c74
--- /dev/null
+++ b/advisories/_posts/2015-02-10-CVE-2015-1426.md
@@ -0,0 +1,34 @@
+---
+layout: advisory
+title: 'CVE-2015-1426 (facter): Puppet Labs Facter allows local users to obtains sensitive
+ Amazon EC2 IAM instance metadata by reading a fact for an Amazon EC2 node.'
+comments: false
+categories:
+- facter
+advisory:
+ gem: facter
+ cve: 2015-1426
+ ghsa: j436-h7hm-rx46
+ url: https://www.puppet.com/security/cve/cve-2015-1426-potential-sensitive-information-leakage-facters-amazon-ec2-metadata
+ title: Puppet Labs Facter allows local users to obtains sensitive Amazon EC2 IAM
+ instance metadata by reading a fact for an Amazon EC2 node.
+ date: 2015-02-10
+ description: |
+ Puppet Labs Facter 1.6.0 through 2.4.0 allows local users to
+ obtains sensitive Amazon EC2 IAM instance metadata by reading
+ a fact for an Amazon EC2 node.
+ cvss_v2: 2.1
+ cvss_v3: 1.3
+ unaffected_versions:
+ - "< 1.6.0"
+ patched_versions:
+ - ">= 2.4.1"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-1426
+ - https://www.puppet.com/security/cve/cve-2015-1426-potential-sensitive-information-leakage-facters-amazon-ec2-metadata
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/disclosure-amazon-ec2-iam-instance/ruby/sid-1508/summary
+ - https://srcclr.com/security/disclosure-amazon-ec2-iam-instance/ruby/s-1508
+ - https://github.com/rubysec/ruby-advisory-db/issues/238
+ - https://github.com/advisories/GHSA-j436-h7hm-rx46
+---
diff --git a/advisories/_posts/2015-02-10-OSVDB-118830.md b/advisories/_posts/2015-02-10-OSVDB-118830.md
new file mode 100644
index 00000000..43d1945f
--- /dev/null
+++ b/advisories/_posts/2015-02-10-OSVDB-118830.md
@@ -0,0 +1,34 @@
+---
+layout: advisory
+title: 'OSVDB-118830 (doorkeeper): Doorkeeper Gem for Ruby stores sensitive information
+ in production logs'
+comments: false
+categories:
+- doorkeeper
+advisory:
+ gem: doorkeeper
+ osvdb: 118830
+ url: https://www.versioneye.com/Ruby/doorkeeper/2.1.1
+ title: Doorkeeper Gem for Ruby stores sensitive information in production logs
+ date: 2015-02-10
+ description: |
+ Doorkeeper Gem for Ruby contains a flaw in lib/doorkeeper/engine.rb.
+ The issue is due to the program storing sensitive information in
+ production logs. This may allow a local attacker to gain access to
+ sensitive information.
+ patched_versions:
+ - "~> 1.4.2"
+ - ">= 2.1.2"
+ related:
+ url:
+ - https://www.versioneye.com/Ruby/doorkeeper/2.1.1
+ - https://github.com/doorkeeper-gem/doorkeeper/commit/d6bca5f32b741b8cee83a4aeb818338b919181fe
+ - https://github.com/doorkeeper-gem/doorkeeper/blob/main/lib/doorkeeper/engine.rb
+ - https://github.com/doorkeeper-gem/doorkeeper/issues/576
+ - https://github.com/rubysec/ruby-advisory-db/pull/128
+ - https://my.diffend.io/gems/doorkeeper/versions/0.3.0
+ - https://security.snyk.io/vuln/SNYK-RUBY-DOORKEEPER-20206
+ - https://www.mend.io/vulnerability-database/WS-2015-0039
+ - http://www.osvdb.org/show/osvdb/118830
+ notes: 'Issue #576 backported to 1.4.x on March 2, 2015.'
+---
diff --git a/advisories/_posts/2015-02-16-CVE-2015-1585.md b/advisories/_posts/2015-02-16-CVE-2015-1585.md
new file mode 100644
index 00000000..563972f4
--- /dev/null
+++ b/advisories/_posts/2015-02-16-CVE-2015-1585.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2015-1585 (fat_free_crm): Fat Free CRM Gem being vulnerable to CSRF-type
+ attacks'
+comments: false
+categories:
+- fat_free_crm
+advisory:
+ gem: fat_free_crm
+ cve: 2015-1585
+ osvdb: 118465
+ ghsa: wx7c-8j35-mpg8
+ url: https://nvd.nist.gov/vuln/detail/CVE-2015-1585
+ title: Fat Free CRM Gem being vulnerable to CSRF-type attacks
+ date: 2015-02-16
+ description: |
+ Fat Free CRM contains a flaw as HTTP requests to /admin/users do not require
+ multiple steps, explicit confirmation, or a unique token when performing
+ certain sensitive actions. By tricking a user into following a specially
+ crafted link, a context-dependent attacker can perform a Cross-Site Request
+ Forgery (CSRF / XSRF) attack causing the victim to creating administrative
+ users.
+ cvss_v2: 6.8
+ patched_versions:
+ - ">= 0.13.6"
+---
diff --git a/advisories/_posts/2015-02-17-CVE-2015-2179.md b/advisories/_posts/2015-02-17-CVE-2015-2179.md
new file mode 100644
index 00000000..ae71115c
--- /dev/null
+++ b/advisories/_posts/2015-02-17-CVE-2015-2179.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2015-2179 (xaviershay-dm-rails): xaviershay-dm-rails Gem for Ruby exposes
+ sensitive information via the process table'
+comments: false
+categories:
+- xaviershay-dm-rails
+advisory:
+ gem: xaviershay-dm-rails
+ cve: 2015-2179
+ osvdb: 118579
+ ghsa: 88p8-4vv5-82j7
+ url: https://nvd.nist.gov/vuln/detail/CVE-2015-2179
+ title: xaviershay-dm-rails Gem for Ruby exposes sensitive information via the process
+ table
+ date: 2015-02-17
+ description: |
+ xaviershay-dm-rails Gem for Ruby contains a flaw in the execute() function
+ in /datamapper/dm-rails/blob/master/lib/dm-rails/storage.rb. The issue is
+ due to the function exposing sensitive information via the process table.
+ This may allow a local attack to gain access to MySQL credential information.
+ cvss_v3: 5.5
+---
diff --git a/advisories/_posts/2015-03-05-OSVDB-119205.md b/advisories/_posts/2015-03-05-OSVDB-119205.md
new file mode 100644
index 00000000..de99b1e3
--- /dev/null
+++ b/advisories/_posts/2015-03-05-OSVDB-119205.md
@@ -0,0 +1,33 @@
+---
+layout: advisory
+title: 'OSVDB-119205 (spree): Spree API Information Disclosure CSRF'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ osvdb: 119205
+ url: https://web.archive.org/web/20150920092934/https://spreecommerce.com/blog/security-updates-2015-3-3
+ title: Spree API Information Disclosure CSRF
+ date: 2015-03-05
+ description: |
+ Spree contains a flaw in the API as HTTP requests do not require
+ multiple steps, explicit confirmation, or a unique token when
+ performing certain sensitive actions. By tricking a user into
+ following a specially crafted link, a context-dependent attacker
+ can perform a Cross-Site Request Forgery (CSRF / XSRF) attack
+ causing the victim to disclose potentially sensitive information
+ to attackers.
+ patched_versions:
+ - "~> 2.2.10"
+ - "~> 2.3.8"
+ - "~> 2.4.5"
+ - ">= 3.0.0.rc4"
+ related:
+ url:
+ - https://web.archive.org/web/20150920092934/https://spreecommerce.com/blog/security-updates-2015-3-3
+ - https://seclists.org/oss-sec/2015/q3/275
+ - https://github.com/spree/spree/commit/bfb5f907219d6f8f879ca940882befe89b58a1a4
+ - https://security.snyk.io/vuln/SNYK-RUBY-SPREE-20360
+ - https://github.com/rubysec/bundler-audit/issues/106
+---
diff --git a/advisories/_posts/2015-03-24-CVE-2015-1820.md b/advisories/_posts/2015-03-24-CVE-2015-1820.md
new file mode 100644
index 00000000..65eed0d2
--- /dev/null
+++ b/advisories/_posts/2015-03-24-CVE-2015-1820.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2015-1820 (rest-client): CVE-2015-1820 rubygem-rest-client: session fixation
+ vulnerability Set-Cookie headers present in an HTTP 30x redirection responses'
+comments: false
+categories:
+- rest-client
+advisory:
+ gem: rest-client
+ cve: 2015-1820
+ osvdb: 119878
+ ghsa: 3fhf-6939-qg8p
+ url: https://github.com/rest-client/rest-client/issues/369
+ title: 'CVE-2015-1820 rubygem-rest-client: session fixation vulnerability Set-Cookie
+ headers present in an HTTP 30x redirection responses'
+ date: 2015-03-24
+ description: |
+ REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers
+ to conduct session fixation attacks or obtain sensitive cookie information by leveraging
+ passage of cookies set in a response to a redirect.
+ cvss_v3: 9.8
+ unaffected_versions:
+ - "<= 1.6.0"
+ patched_versions:
+ - ">= 1.8.0"
+---
diff --git a/advisories/_posts/2015-03-24-CVE-2015-1828.md b/advisories/_posts/2015-03-24-CVE-2015-1828.md
new file mode 100644
index 00000000..434e1e25
--- /dev/null
+++ b/advisories/_posts/2015-03-24-CVE-2015-1828.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2015-1828 (http): HTTPS MitM vulnerability in http.rb'
+comments: false
+categories:
+- http
+advisory:
+ gem: http
+ cve: 2015-1828
+ osvdb: 119927
+ ghsa: 6wpv-cj6x-v3jw
+ url: https://groups.google.com/forum/#!topic/httprb/jkb4oxwZjkU
+ title: HTTPS MitM vulnerability in http.rb
+ date: 2015-03-24
+ description: |
+ http.rb failed to call the OpenSSL::SSL::SSLSocket#post_connection_check method to perform hostname verification.
+ Because of this, an attacker with a valid certificate but with a mismatched subject can perform a MitM attack.
+ cvss_v2: 5.0
+ cvss_v3: 5.9
+ patched_versions:
+ - ">= 0.7.3"
+ - "~> 0.6.4"
+---
diff --git a/advisories/_posts/2015-04-07-OSVDB-120415.md b/advisories/_posts/2015-04-07-OSVDB-120415.md
new file mode 100644
index 00000000..d66d2522
--- /dev/null
+++ b/advisories/_posts/2015-04-07-OSVDB-120415.md
@@ -0,0 +1,33 @@
+---
+layout: advisory
+title: 'OSVDB-120415 (redcarpet): redcarpet Gem for Ruby markdown.c parse_inline()
+ Function XSS'
+comments: false
+categories:
+- redcarpet
+advisory:
+ gem: redcarpet
+ osvdb: 120415
+ url: http://danlec.com/blog/bug-in-sundown-and-redcarpet
+ title: redcarpet Gem for Ruby markdown.c parse_inline() Function XSS
+ date: 2015-04-07
+ description: |
+ redcarpet Gem for Ruby contains a flaw that allows a cross-site scripting
+ (XSS) attack. This flaw exists because the parse_inline() function in
+ markdown.c does not validate input before returning it to users. This may
+ allow a remote attacker to create a specially crafted request that would
+ execute arbitrary script code in a user's browser session within the trust
+ relationship between their browser and the server.
+ patched_versions:
+ - ">= 3.2.3"
+ related:
+ url:
+ - https://github.com/vmg/redcarpet/releases/tag/v3.2.3
+ - http://danlec.com/blog/bug-in-sundown-and-redcarpet
+ - https://hackerone.com/reports/46916
+ - https://github.com/vmg/redcarpet/blob/master/ext/redcarpet/markdown.c
+ - https://github.com/Homebrew/brew.sh/issues/75
+ - https://git.revreso.de/gigadoc2/diaspora/-/tags/v0.4.1.3
+ - https://www.rapid7.com/db/vulnerabilities/freebsd-vid-c368155a-fa83-11e4-bc58-001e67150279
+ - https://www.mend.io/vulnerability-database/WS-2015-0038
+---
diff --git a/advisories/_posts/2015-04-14-CVE-2015-1819.md b/advisories/_posts/2015-04-14-CVE-2015-1819.md
new file mode 100644
index 00000000..6a6740a7
--- /dev/null
+++ b/advisories/_posts/2015-04-14-CVE-2015-1819.md
@@ -0,0 +1,61 @@
+---
+layout: advisory
+title: 'CVE-2015-1819 (nokogiri): Nokogiri gem contains several vulnerabilities in
+ libxml2 and libxslt'
+comments: false
+categories:
+- nokogiri
+advisory:
+ gem: nokogiri
+ cve: 2015-1819
+ ghsa: q7wx-62r7-j2x7
+ url: https://github.com/sparklemotion/nokogiri/issues/1374
+ title: Nokogiri gem contains several vulnerabilities in libxml2 and libxslt
+ date: 2015-04-14
+ description: |
+ Several vulnerabilities were discovered in the libxml2 and libxslt libraries
+ that the Nokogiri gem depends on.
+
+ CVE-2015-1819
+ A denial of service flaw was found in the way libxml2 parsed XML
+ documents. This flaw could cause an application that uses libxml2 to use an
+ excessive amount of memory.
+
+ CVE-2015-7941
+ libxml2 does not properly stop parsing invalid input, which allows
+ context-dependent attackers to cause a denial of service (out-of-bounds read
+ and libxml2 crash) via crafted specially XML data.
+
+ CVE-2015-7942
+ The xmlParseConditionalSections function in parser.c in libxml2
+ does not properly skip intermediary entities when it stops parsing invalid
+ input, which allows context-dependent attackers to cause a denial of service
+ (out-of-bounds read and crash) via crafted XML data.
+
+ CVE-2015-7995
+ The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not
+ check whether the parent node is an element, which allows attackers to cause
+ a denial of service using a specially crafted XML document.
+
+ CVE-2015-8035
+ The xz_decomp function in xzlib.c in libxml2 2.9.1 does not
+ properly detect compression errors, which allows context-dependent attackers
+ to cause a denial of service (process hang) via crafted XML data.
+
+ Another vulnerability was discoverd in libxml2 that could cause parsing
+ of unclosed comments to result in "conditional jump or move depends on
+ uninitialized value(s)" and unsafe memory access. This issue does not have a
+ CVE assigned yet. See related URLs for details. Patched in v1.6.7.rc4.
+ patched_versions:
+ - "~> 1.6.6.4"
+ - ">= 1.6.7.rc4"
+ related:
+ cve:
+ - 2015-7941
+ - 2015-7942
+ - 2015-7995
+ - 2015-8035
+ url:
+ - https://github.com/sparklemotion/nokogiri/pull/1376
+ - https://github.com/sparklemotion/nokogiri/commit/8f3de6d88d0da11fb62a45daa61b85ce71b4af59
+---
diff --git a/advisories/_posts/2015-04-14-CVE-2015-1866.md b/advisories/_posts/2015-04-14-CVE-2015-1866.md
new file mode 100644
index 00000000..bc01e298
--- /dev/null
+++ b/advisories/_posts/2015-04-14-CVE-2015-1866.md
@@ -0,0 +1,36 @@
+---
+layout: advisory
+title: 'CVE-2015-1866 (ember-source): Ember.js XSS Vulnerability With {{view "select"}}
+ Options'
+comments: false
+categories:
+- ember-source
+advisory:
+ gem: ember-source
+ cve: 2015-1866
+ ghsa: mp78-r56v-45qc
+ url: https://groups.google.com/forum/#!topic/ember-security/nbntfs2EbRU
+ title: Ember.js XSS Vulnerability With {{view "select"}} Options
+ date: 2015-04-14
+ description: |
+ In general, Ember.js escapes or strips any user-supplied content before
+ inserting it in strings that will be sent to innerHTML. However, a
+ change made to the implementation of the select view means that any
+ user-supplied data bound to an option's label will not be escaped
+ correctly.
+
+ In applications that use Ember's select view and pass user-supplied
+ content to the label, a specially-crafted payload could execute
+ arbitrary JavaScript in the context of the current domain ("XSS").
+
+ All users running an affected release and binding user-supplied data to
+ the select options should either upgrade or use one of the workarounds
+ immediately.
+ cvss_v3: 6.1
+ unaffected_versions:
+ - "< 1.10.0"
+ patched_versions:
+ - "~> 1.10.1"
+ - "~> 1.11.2"
+ - ">= 1.12.0"
+---
diff --git a/advisories/_posts/2015-04-15-OSVDB-120857.md b/advisories/_posts/2015-04-15-OSVDB-120857.md
new file mode 100644
index 00000000..32ed8450
--- /dev/null
+++ b/advisories/_posts/2015-04-15-OSVDB-120857.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'OSVDB-120857 (refile): refile Gem for Ruby contains a remote code execution
+ vulnerability'
+comments: false
+categories:
+- refile
+advisory:
+ gem: refile
+ osvdb: 120857
+ url: https://groups.google.com/g/ruby-security-ann/c/VIfMO2LvzNs
+ title: refile Gem for Ruby contains a remote code execution vulnerability
+ date: 2015-04-15
+ description: |
+ refile Gem for Ruby contains a flaw that is triggered when input is not
+ sanitized when handling the 'remote_image_url' field in a form, where
+ 'image' is the name of the attachment. This may allow a remote attacker
+ to execute arbitrary shell commands.
+ unaffected_versions:
+ - "< 0.5.0"
+ patched_versions:
+ - ">= 0.5.4"
+ related:
+ url:
+ - https://groups.google.com/g/ruby-security-ann/c/VIfMO2LvzNs
+---
diff --git a/advisories/_posts/2015-04-21-OSVDB-125678.md b/advisories/_posts/2015-04-21-OSVDB-125678.md
new file mode 100644
index 00000000..5ea6dbd9
--- /dev/null
+++ b/advisories/_posts/2015-04-21-OSVDB-125678.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'OSVDB-125678 (sidekiq): Sidekiq Gem for Ruby web/views/queue.erb msg.display_class
+ Element XSS'
+comments: false
+categories:
+- sidekiq
+advisory:
+ gem: sidekiq
+ osvdb: 125678
+ url: https://seclists.org/oss-sec/2015/q3/267
+ title: Sidekiq Gem for Ruby web/views/queue.erb msg.display_class Element XSS
+ date: 2015-04-21
+ description: 'XSS via job arguments display class in Sidekiq::Web
+
+ '
+ patched_versions:
+ - ">= 3.4.0"
+ related:
+ url:
+ - https://seclists.org/oss-sec/2015/q3/267
+ - https://github.com/mperham/sidekiq/pull/2309
+ - https://github.com/sidekiq/sidekiq/commit/54766f336620ca0ce3b0b87a7a56382496e64b61
+---
diff --git a/advisories/_posts/2015-04-29-CVE-2015-20108.md b/advisories/_posts/2015-04-29-CVE-2015-20108.md
new file mode 100644
index 00000000..31709554
--- /dev/null
+++ b/advisories/_posts/2015-04-29-CVE-2015-20108.md
@@ -0,0 +1,35 @@
+---
+layout: advisory
+title: 'CVE-2015-20108 (ruby-saml): ruby-saml gem is vulnerable to XPath injection'
+comments: false
+categories:
+- ruby-saml
+advisory:
+ gem: ruby-saml
+ osvdb: 124991
+ cve: 2015-20108
+ ghsa: r364-2pj4-pf7f
+ url: https://security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20217
+ title: ruby-saml gem is vulnerable to XPath injection
+ date: 2015-04-29
+ description: |
+ xml_security.rb in the ruby-saml gem before 1.0.0 for Ruby
+ allows XPath injection and code execution because prepared
+ statements are not used.
+
+ The lack of prepared statements allows for possibly command
+ injection, leading to arbitrary code execution.
+ cvss_v2: 6.7
+ cvss_v3: 9.8
+ patched_versions:
+ - ">= 1.0.0"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-20108
+ - https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.0.0
+ - https://github.com/SAML-Toolkits/ruby-saml/pull/225
+ - https://github.com/SAML-Toolkits/ruby-saml/commit/9853651b96b99653ea8627d757d46bfe62ab6448
+ - https://security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20217
+ - https://www.mend.io/vulnerability-database/WS-2015-0036
+ - https://github.com/advisories/GHSA-r364-2pj4-pf7f
+---
diff --git a/advisories/_posts/2015-04-29-CVE-2015-3448.md b/advisories/_posts/2015-04-29-CVE-2015-3448.md
new file mode 100644
index 00000000..5b964047
--- /dev/null
+++ b/advisories/_posts/2015-04-29-CVE-2015-3448.md
@@ -0,0 +1,21 @@
+---
+layout: advisory
+title: 'CVE-2015-3448 (rest-client): rest-client ruby gem logs sensitive information'
+comments: false
+categories:
+- rest-client
+advisory:
+ gem: rest-client
+ cve: 2015-3448
+ ghsa: mx9f-w8qq-q5jf
+ url: https://github.com/rest-client/rest-client/issues/349
+ title: rest-client ruby gem logs sensitive information
+ date: 2015-04-29
+ description: |
+ REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and
+ passwords, which allows local users to obtain sensitive information by reading the
+ log.
+ cvss_v2: 2.1
+ patched_versions:
+ - ">= 1.7.3"
+---
diff --git a/advisories/_posts/2015-04-29-OSVDB-124991.md b/advisories/_posts/2015-04-29-OSVDB-124991.md
new file mode 100644
index 00000000..e5188bf6
--- /dev/null
+++ b/advisories/_posts/2015-04-29-OSVDB-124991.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'OSVDB-124991 (ruby-saml): Ruby-Saml Gem is vulnerable to XPath Injection'
+comments: false
+categories:
+- ruby-saml
+advisory:
+ gem: ruby-saml
+ osvdb: 124991
+ url: https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.0.0
+ title: Ruby-Saml Gem is vulnerable to XPath Injection
+ date: 2015-04-29
+ description: |
+ ruby-saml before 1.0.0 is vulnerable to XPath injection on
+ xml_security.rb. The lack of prepared statements allows for
+ possibly command injection, leading to arbitrary code execution.
+ cvss_v2: 6.7
+ patched_versions:
+ - ">= 1.0.0"
+ related:
+ url:
+ - https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.0.0
+ - https://github.com/SAML-Toolkits/ruby-saml/pull/225
+ - https://security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20217
+ - https://www.mend.io/vulnerability-database/WS-2015-0036
+---
diff --git a/advisories/_posts/2015-05-05-CVE-2015-3649.md b/advisories/_posts/2015-05-05-CVE-2015-3649.md
new file mode 100644
index 00000000..27bc76df
--- /dev/null
+++ b/advisories/_posts/2015-05-05-CVE-2015-3649.md
@@ -0,0 +1,22 @@
+---
+layout: advisory
+title: 'CVE-2015-3649 (open-uri-cached): open-uri-cached Gem for Ruby Unsafe Temporary
+ File Creation Local Privilege Escalation'
+comments: false
+categories:
+- open-uri-cached
+advisory:
+ gem: open-uri-cached
+ cve: 2015-3649
+ osvdb: 121701
+ ghsa: 7m2w-9gw7-c3xp
+ url: http://seclists.org/oss-sec/2015/q2/373
+ title: open-uri-cached Gem for Ruby Unsafe Temporary File Creation Local Privilege
+ Escalation
+ date: 2015-05-05
+ description: |
+ open-uri-cached Gem for Ruby contains a flaw that is due to the
+ program creating temporary files in a predictable, unsafe manner when using
+ YAML. This may allow a local attacker to gain elevated privileges.
+ cvss_v3: 7.8
+---
diff --git a/advisories/_posts/2015-05-11-OSVDB-126329.md b/advisories/_posts/2015-05-11-OSVDB-126329.md
new file mode 100644
index 00000000..ccbddb1e
--- /dev/null
+++ b/advisories/_posts/2015-05-11-OSVDB-126329.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'OSVDB-126329 (sidekiq-pro): Sidekiq Pro Gem for Ruby web/views/batch.erb Class
+ and ErrorMessage Elements Reflected XSS'
+comments: false
+categories:
+- sidekiq-pro
+advisory:
+ gem: sidekiq-pro
+ osvdb: 126329
+ url: https://github.com/sidekiq/sidekiq/blob/main/Pro-Changes.md#202
+ title: Sidekiq Pro Gem for Ruby web/views/batch.erb Class and ErrorMessage Elements
+ Reflected XSS
+ date: 2015-05-11
+ description: 'XSS via batch failure error_class and error_message in Sidekiq::Web
+
+ '
+ patched_versions:
+ - ">= 2.0.2"
+ related:
+ url:
+ - https://github.com/sidekiq/sidekiq/blob/main/Pro-Changes.md#202
+ - https://github.com/mperham/sidekiq/commit/a695ff347ae50f641dfc35189131b232ea0aa1db
+ - https://github.com/sidekiq/sidekiq/issues/2467
+ - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQPRO-20219
+---
diff --git a/advisories/_posts/2015-05-14-CVE-2015-3900.md b/advisories/_posts/2015-05-14-CVE-2015-3900.md
new file mode 100644
index 00000000..740257db
--- /dev/null
+++ b/advisories/_posts/2015-05-14-CVE-2015-3900.md
@@ -0,0 +1,31 @@
+---
+layout: advisory
+title: 'CVE-2015-3900 (rubygems-update): CVE-2015-3900 rubygems: DNS hijacking vulnerability
+ in api_endpoint()'
+comments: false
+categories:
+- rubygems-update
+- rubygems
+advisory:
+ gem: rubygems-update
+ library: rubygems
+ cve: 2015-3900
+ osvdb: 122162
+ ghsa: wp3j-rvfp-624h
+ url: https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356
+ title: 'CVE-2015-3900 rubygems: DNS hijacking vulnerability in api_endpoint()'
+ date: 2015-05-14
+ description: |
+ RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7
+ does not validate the hostname when fetching gems or making API requests, which
+ allows remote attackers to redirect requests to arbitrary domains via a crafted
+ DNS SRV record, aka a "DNS hijack attack." A flaw was found in a way rubygems verified
+ the API endpoint hostname retrieved through a DNS SRV record. A man-in-the-middle
+ attacker could use this flaw to force a client to download content from an untrusted
+ domain.
+ cvss_v2: 5.0
+ patched_versions:
+ - "~> 2.0.16"
+ - "~> 2.2.4"
+ - ">= 2.4.7"
+---
diff --git a/advisories/_posts/2015-05-25-CVE-2015-9284.md b/advisories/_posts/2015-05-25-CVE-2015-9284.md
new file mode 100644
index 00000000..a406d8b6
--- /dev/null
+++ b/advisories/_posts/2015-05-25-CVE-2015-9284.md
@@ -0,0 +1,33 @@
+---
+layout: advisory
+title: 'CVE-2015-9284 (omniauth): CSRF vulnerability in OmniAuth''s request phase'
+comments: false
+categories:
+- omniauth
+advisory:
+ gem: omniauth
+ cve: 2015-9284
+ ghsa: ww4x-rwq6-qpgf
+ url: https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284
+ title: CSRF vulnerability in OmniAuth's request phase
+ date: 2015-05-25
+ description: |
+ The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site
+ Request Forgery (CSRF) when used as part of the Ruby on Rails framework, allowing
+ accounts to be connected without user intent, user interaction, or feedback to
+ the user. This permits a secondary account to be able to sign into the web
+ application as the primary account.
+
+ In order to mitigate this vulnerability, Rails users should consider using the
+ `omniauth-rails_csrf_protection` gem.
+
+ More info is available here: https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284
+ cvss_v2: 6.8
+ cvss_v3: 8.8
+ patched_versions:
+ - ">= 2.0.0"
+ related:
+ url:
+ - https://github.com/omniauth/omniauth/pull/809
+ - https://github.com/cookpad/omniauth-rails_csrf_protection
+---
diff --git a/advisories/_posts/2015-06-04-CVE-2015-4410.md b/advisories/_posts/2015-06-04-CVE-2015-4410.md
new file mode 100644
index 00000000..e5e0634c
--- /dev/null
+++ b/advisories/_posts/2015-06-04-CVE-2015-4410.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2015-4410 (moped): Data Injection Vulnerability in moped Rubygem'
+comments: false
+categories:
+- moped
+advisory:
+ gem: moped
+ cve: 2015-4410
+ ghsa: f93j-hmcr-jcwh
+ url: http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html
+ title: Data Injection Vulnerability in moped Rubygem
+ date: 2015-06-04
+ description: |
+ A flaw in the ObjectId validation regular expression can enable attackers
+ to inject arbitrary information into a given BSON object.
+ cvss_v3: 7.5
+ patched_versions:
+ - "~> 1.5.3"
+ - ">= 2.0.5"
+ related:
+ url:
+ - https://github.com/mongoid/moped/compare/e5fc928bcb5b7b89d171e31e31483be4185971b9...32cba17ad7d3da326778b4d8cd4b52e75bca9d40
+ - https://github.com/mongoid/moped/commit/276fbfd23c5ffb65e6bd18d564c8b6878c2498ac
+---
diff --git a/advisories/_posts/2015-06-04-CVE-2015-4412.md b/advisories/_posts/2015-06-04-CVE-2015-4412.md
new file mode 100644
index 00000000..101cfc72
--- /dev/null
+++ b/advisories/_posts/2015-06-04-CVE-2015-4412.md
@@ -0,0 +1,25 @@
+---
+layout: advisory
+title: 'CVE-2015-4412 (bson): Data Injection Vulnerability in bson Rubygem'
+comments: false
+categories:
+- bson
+advisory:
+ gem: bson
+ cve: 2015-4412
+ ghsa: h6rj-8r3c-9gpj
+ url: http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html
+ title: Data Injection Vulnerability in bson Rubygem
+ date: 2015-06-04
+ description: |
+ A flaw in the ObjectId validation regular expression can enable attackers
+ to inject arbitrary information into a given BSON object.
+ cvss_v3: 9.8
+ patched_versions:
+ - "~> 1.12.3"
+ - ">= 3.0.4"
+ related:
+ url:
+ - https://github.com/mongodb/mongo-ruby-driver/compare/6ae981167759d5819ba3d41e374e5b2af5b79077~1...9859a3ab9773a8a883eb8438b665a921cc991c71
+ - https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7
+---
diff --git a/advisories/_posts/2015-06-04-OSVDB-125676.md b/advisories/_posts/2015-06-04-OSVDB-125676.md
new file mode 100644
index 00000000..29b71507
--- /dev/null
+++ b/advisories/_posts/2015-06-04-OSVDB-125676.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'OSVDB-125676 (sidekiq): Sidekiq Gem for Ruby web/views/queue.erb Element Reflected
+ XSS'
+comments: false
+categories:
+- sidekiq
+advisory:
+ gem: sidekiq
+ osvdb: 125676
+ url: https://seclists.org/oss-sec/2015/q3/267
+ title: Sidekiq Gem for Ruby web/views/queue.erb Element Reflected XSS
+ date: 2015-06-04
+ description: |
+ Sidekiq Gem for Ruby web/views/queue.erb [CurrentMessagesInQueue,
+ AreYouSureDeleteQueue] Element Reflected XSS
+ patched_versions:
+ - ">= 3.4.0"
+ related:
+ osvdb:
+ - 125677
+ url:
+ - https://seclists.org/oss-sec/2015/q3/267
+ - https://github.com/mperham/sidekiq/issues/2330
+ - https://github.com/sidekiq/sidekiq/commit/2178d66b6686fbf4430223c34c184a64c9906828
+ - https://github.com/rubysec/ruby-advisory-db/pull/196
+ - https://github.com/rubysec/ruby-advisory-db/commit/19a8fc075a6cc0702f978219c88d97c666fecdbd
+---
diff --git a/advisories/_posts/2015-06-05-CVE-2015-2963.md b/advisories/_posts/2015-06-05-CVE-2015-2963.md
new file mode 100644
index 00000000..ffd44c4b
--- /dev/null
+++ b/advisories/_posts/2015-06-05-CVE-2015-2963.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2015-2963 (paperclip): Paperclip Gem for Ruby vulnerable to content type
+ spoofing'
+comments: false
+categories:
+- paperclip
+advisory:
+ gem: paperclip
+ cve: 2015-2963
+ ghsa: 6jvm-3j5h-79f6
+ url: https://robots.thoughtbot.com/paperclip-security-release
+ title: Paperclip Gem for Ruby vulnerable to content type spoofing
+ date: 2015-06-05
+ description: |
+ There is an issue where if an HTML file is uploaded with a .html
+ extension, but the content type is listed as being `image/jpeg`, this
+ will bypass a validation checking for images. But it will also pass the
+ spoof check, because a file named .html and containing actual HTML
+ passes the spoof check.
+ cvss_v2: 4.3
+ patched_versions:
+ - ">= 4.2.2"
+---
diff --git a/advisories/_posts/2015-06-08-CVE-2015-4020.md b/advisories/_posts/2015-06-08-CVE-2015-4020.md
new file mode 100644
index 00000000..f383325c
--- /dev/null
+++ b/advisories/_posts/2015-06-08-CVE-2015-4020.md
@@ -0,0 +1,29 @@
+---
+layout: advisory
+title: 'CVE-2015-4020 (rubygems-update): RubyGems remote_fetcher.rb api_endpoint()
+ Function Missing SRV Record Hostname Validation Request Hijacking'
+comments: false
+categories:
+- rubygems-update
+- rubygems
+advisory:
+ gem: rubygems-update
+ library: rubygems
+ cve: 2015-4020
+ ghsa: qv62-xfj6-32xm
+ url: https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478
+ title: RubyGems remote_fetcher.rb api_endpoint() Function Missing SRV Record Hostname
+ Validation Request Hijacking
+ date: 2015-06-08
+ description: |
+ RubyGems contains a flaw in the api_endpoint() function in remote_fetcher.rb
+ that is triggered when handling hostnames in SRV records. With a specially
+ crafted response, a context-dependent attacker may conduct DNS hijacking
+ attacks. This vulnerability is due to an incomplete fix for CVE-2015-3900,
+ which allowed redirection to an arbitrary gem server in any security domain.
+ cvss_v2: 5.0
+ patched_versions:
+ - "~> 2.0.17"
+ - "~> 2.2.5"
+ - ">= 2.4.8"
+---
diff --git a/advisories/_posts/2015-06-16-CVE-2015-1840.md b/advisories/_posts/2015-06-16-CVE-2015-1840.md
new file mode 100644
index 00000000..28cb4603
--- /dev/null
+++ b/advisories/_posts/2015-06-16-CVE-2015-1840.md
@@ -0,0 +1,43 @@
+---
+layout: advisory
+title: 'CVE-2015-1840 (jquery-ujs): CSRF Vulnerability in jquery-ujs'
+comments: false
+categories:
+- jquery-ujs
+advisory:
+ gem: jquery-ujs
+ cve: 2015-1840
+ ghsa: 4whc-pp4x-9pf3
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/XIZPbobuwaY
+ title: CSRF Vulnerability in jquery-ujs
+ date: 2015-06-16
+ description: |
+ In the scenario where an attacker might be able to control the href attribute
+ of an anchor tag or the action attribute of a form tag that will trigger a
+ POST action, the attacker can set the href or action to
+ " https://attacker.com" (note the leading space) that will be passed to
+ JQuery, who will see this as a same origin request, and send the user's CSRF
+ token to the attacker domain.
+
+ To work around this problem, change code that allows users to control the
+ href attribute of an anchor tag or the action attribute of a form tag to
+ filter the user parameters.
+
+ For example, code like this:
+
+ link_to params
+
+ to code like this:
+
+ link_to filtered_params
+
+ def filtered_params
+ \# Filter just the parameters that you trust
+ end
+
+ See also:
+ - http://blog.honeybadger.io/understanding-the-rails-jquery-csrf-vulnerability-cve-2015-1840/
+ cvss_v2: 5.0
+ patched_versions:
+ - ">= 1.0.4"
+---
diff --git a/advisories/_posts/2015-06-16-CVE-2015-3224.md b/advisories/_posts/2015-06-16-CVE-2015-3224.md
new file mode 100644
index 00000000..1a719657
--- /dev/null
+++ b/advisories/_posts/2015-06-16-CVE-2015-3224.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'CVE-2015-3224 (web-console): IP whitelist bypass in Web Console'
+comments: false
+categories:
+- web-console
+advisory:
+ gem: web-console
+ cve: 2015-3224
+ ghsa: 67j6-xv27-w6ww
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/lzmz9_ijUFw
+ title: IP whitelist bypass in Web Console
+ date: 2015-06-16
+ description: |
+ Specially crafted remote requests can spoof their origin, bypassing the IP whitelist, in any environment where Web Console is enabled (development and test, by default).
+
+ Users whose application is only accessible from localhost (as is the default behaviour in Rails 4.2) are not affected, unless a local proxy is involved.
+
+ All affected users should either upgrade or use one of the work arounds immediately.
+
+ To work around this issue, turn off web-console in all environments, by removing/commenting it from the application's Gemfile.
+ patched_versions:
+ - ">= 2.1.3"
+---
diff --git a/advisories/_posts/2015-06-16-CVE-2015-3225.md b/advisories/_posts/2015-06-16-CVE-2015-3225.md
new file mode 100644
index 00000000..217bba83
--- /dev/null
+++ b/advisories/_posts/2015-06-16-CVE-2015-3225.md
@@ -0,0 +1,23 @@
+---
+layout: advisory
+title: 'CVE-2015-3225 (rack): Potential Denial of Service Vulnerability in Rack'
+comments: false
+categories:
+- rack
+advisory:
+ gem: rack
+ cve: 2015-3225
+ ghsa: rgr4-9jh5-j4j6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/gcUbICUmKMc
+ title: Potential Denial of Service Vulnerability in Rack
+ date: 2015-06-16
+ description: |
+ Carefully crafted requests can cause a `SystemStackError` and potentially
+ cause a denial of service attack.
+
+ All users running an affected release should upgrade.
+ patched_versions:
+ - ">= 1.6.2"
+ - "~> 1.5.4"
+ - "~> 1.4.6"
+---
diff --git a/advisories/_posts/2015-06-16-CVE-2015-3226.md b/advisories/_posts/2015-06-16-CVE-2015-3226.md
new file mode 100644
index 00000000..9074ed63
--- /dev/null
+++ b/advisories/_posts/2015-06-16-CVE-2015-3226.md
@@ -0,0 +1,58 @@
+---
+layout: advisory
+title: 'CVE-2015-3226 (activesupport): XSS Vulnerability in ActiveSupport::JSON.encode'
+comments: false
+categories:
+- activesupport
+- rails
+advisory:
+ gem: activesupport
+ framework: rails
+ cve: 2015-3226
+ ghsa: vxvp-4xwc-jpp6
+ url: https://groups.google.com/forum/#!topic/ruby-security-ann/7VlB_pck3hU
+ title: XSS Vulnerability in ActiveSupport::JSON.encode
+ date: 2015-06-16
+ description: |
+ When a `Hash` containing user-controlled data is encode as JSON (either through
+ `Hash#to_json` or `ActiveSupport::JSON.encode`), Rails does not perform adequate
+ escaping that matches the guarantee implied by the `escape_html_entities_in_json`
+ option (which is enabled by default). If this resulting JSON string is subsequently
+ inserted directly into an HTML page, the page will be vulnerable to XSS attacks.
+
+ For example, the following code snippet is vulnerable to this attack:
+
+ <%= javascript_tag "var data = #{user_supplied_data.to_json};" %>
+
+ Similarly, the following is also vulnerable:
+
+
+
+ All applications that renders JSON-encoded strings that contains user-controlled
+ data in their views should either upgrade to one of the FIXED versions or use
+ the suggested workaround immediately.
+
+ Workarounds
+ -----------
+ To work around this problem add an initializer with the following code:
+
+ module ActiveSupport
+ module JSON
+ module Encoding
+ private
+ class EscapedString
+ def to_s
+ self
+ end
+ end
+ end
+ end
+ end
+ unaffected_versions:
+ - "< 4.1.0"
+ patched_versions:
+ - ">= 4.2.2"
+ - "~> 4.1.11"
+---
diff --git a/advisories/_posts/2015-06-16-CVE-2015-3227.md b/advisories/_posts/2015-06-16-CVE-2015-3227.md
new file mode 100644
index 00000000..c49fdcc4
--- /dev/null
+++ b/advisories/_posts/2015-06-16-CVE-2015-3227.md
@@ -0,0 +1,38 @@
+---
+layout: advisory
+title: 'CVE-2015-3227 (activesupport): Possible Denial of Service attack in Active
+ Support'
+comments: false
+categories:
+- activesupport
+- rails
+advisory:
+ gem: activesupport
+ framework: rails
+ cve: 2015-3227
+ ghsa: j96r-xvjq-r9pg
+ url: https://groups.google.com/forum/#!topic/rubyonrails-security/bahr2JLnxvk
+ title: Possible Denial of Service attack in Active Support
+ date: 2015-06-16
+ description: |
+ Specially crafted XML documents can cause applications to raise a
+ `SystemStackError` and potentially cause a denial of service attack. This
+ only impacts applications using REXML or JDOM as their XML processor. Other
+ XML processors that Rails supports are not impacted.
+
+ All users running an affected release should either upgrade or use one of the work arounds immediately.
+
+ Workarounds
+ -----------
+ Use an XML parser that is not impacted by this problem, such as Nokogiri or
+ LibXML. You can change the processor like this:
+
+ ActiveSupport::XmlMini.backend = 'Nokogiri'
+
+ If you cannot change XML parsers, then adjust
+ `RUBY_THREAD_MACHINE_STACK_SIZE`.
+ patched_versions:
+ - ">= 4.2.2"
+ - "~> 4.1.11"
+ - "~> 3.2.22"
+---
diff --git a/advisories/_posts/2015-06-16-CVE-2015-4619.md b/advisories/_posts/2015-06-16-CVE-2015-4619.md
new file mode 100644
index 00000000..8b3fe482
--- /dev/null
+++ b/advisories/_posts/2015-06-16-CVE-2015-4619.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2015-4619 (spina): Cross-site request forgery (CSRF) vulnerability in
+ Spina gem'
+comments: false
+categories:
+- spina
+advisory:
+ gem: spina
+ cve: 2015-4619
+ ghsa: 2hxv-mx8x-mcj9
+ url: http://www.openwall.com/lists/oss-security/2015/06/16/11
+ title: Cross-site request forgery (CSRF) vulnerability in Spina gem
+ date: 2015-06-16
+ description: |
+ "`Spina::ApplicationController` actions didn't have CSRF protection.
+ This causes a CSRF vulnerability across the entire engine which includes administrative
+ functionality such as creating users, changing passwords, and media management."
+ cvss_v3: 8.8
+ patched_versions:
+ - ">= 0.6.29"
+ related:
+ url:
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/cross-site-request-forgery-csrf/ruby/sid-1686/summary
+ - https://github.com/rubysec/ruby-advisory-db/issues/238
+---
diff --git a/advisories/_posts/2015-06-22-CVE-2015-5147.md b/advisories/_posts/2015-06-22-CVE-2015-5147.md
new file mode 100644
index 00000000..14de4e1a
--- /dev/null
+++ b/advisories/_posts/2015-06-22-CVE-2015-5147.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'CVE-2015-5147 (redcarpet): redcarpet Gem for Ruby html.c header_anchor() Function
+ Stack Overflow'
+comments: false
+categories:
+- redcarpet
+advisory:
+ gem: redcarpet
+ cve: 2015-5147
+ osvdb: 123859
+ ghsa: 7322-9mx6-5j2m
+ url: http://seclists.org/oss-sec/2015/q2/818
+ title: redcarpet Gem for Ruby html.c header_anchor() Function Stack Overflow
+ date: 2015-06-22
+ description: |
+ redcarpet Gem for Ruby contains a flaw that allows a stack overflow.
+ This flaw exists because the header_anchor() function in html.c uses
+ variable length arrays (VLA) without any range checking. This may
+ allow a remote attacker to execute arbitrary code.
+ cvss_v2: 7.5
+ unaffected_versions:
+ - "< 3.3.0"
+ patched_versions:
+ - ">= 3.3.2"
+---
diff --git a/advisories/_posts/2015-06-30-OSVDB-124383.md b/advisories/_posts/2015-06-30-OSVDB-124383.md
new file mode 100644
index 00000000..46d0cfc9
--- /dev/null
+++ b/advisories/_posts/2015-06-30-OSVDB-124383.md
@@ -0,0 +1,26 @@
+---
+layout: advisory
+title: 'OSVDB-124383 (ruby-saml): Ruby-Saml Gem is vulnerable to entity expansion
+ attacks'
+comments: false
+categories:
+- ruby-saml
+advisory:
+ gem: ruby-saml
+ osvdb: 124383
+ url: https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.0.0
+ title: Ruby-Saml Gem is vulnerable to entity expansion attacks
+ date: 2015-06-30
+ description: 'ruby-saml before 1.0.0 is vulnerable to entity expansion attacks.
+
+ '
+ cvss_v2: 3.9
+ patched_versions:
+ - ">= 1.0.0"
+ related:
+ url:
+ - https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.0.0
+ - https://github.com/SAML-Toolkits/ruby-saml/pull/247
+ - https://security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20232
+ - https://github.com/onelogin/ruby-saml/pull/247
+---
diff --git a/advisories/_posts/2015-07-06-OSVDB-125675.md b/advisories/_posts/2015-07-06-OSVDB-125675.md
new file mode 100644
index 00000000..5f025de6
--- /dev/null
+++ b/advisories/_posts/2015-07-06-OSVDB-125675.md
@@ -0,0 +1,24 @@
+---
+layout: advisory
+title: 'OSVDB-125675 (sidekiq): Sidekiq Gem for Ruby Multiple Unspecified CSRF'
+comments: false
+categories:
+- sidekiq
+advisory:
+ gem: sidekiq
+ osvdb: 125675
+ url: https://seclists.org/oss-sec/2015/q3/267
+ title: Sidekiq Gem for Ruby Multiple Unspecified CSRF
+ date: 2015-07-06
+ description: 'Sidekiq::Web lacks CSRF protection
+
+ '
+ patched_versions:
+ - ">= 3.4.2"
+ related:
+ url:
+ - https://seclists.org/oss-sec/2015/q3/267
+ - https://github.com/mperham/sidekiq/pull/2422
+ - https://github.com/sidekiq/sidekiq/commit/cf3c43b2410c4573e05ac119494e41115f4140ad
+ - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-20233
+---
diff --git a/advisories/_posts/2015-07-13-CVE-2017-11173.md b/advisories/_posts/2015-07-13-CVE-2017-11173.md
new file mode 100644
index 00000000..2e30997e
--- /dev/null
+++ b/advisories/_posts/2015-07-13-CVE-2017-11173.md
@@ -0,0 +1,30 @@
+---
+layout: advisory
+title: 'CVE-2017-11173 (rack-cors): rack-cors Gem Missing Anchor permits unauthorized
+ CORS requests'
+comments: false
+categories:
+- rack-cors
+advisory:
+ gem: rack-cors
+ cve: 2017-11173
+ ghsa: 2j9c-9vmv-7m39
+ url: https://github.com/cyu/rack-cors/issues/86
+ title: rack-cors Gem Missing Anchor permits unauthorized CORS requests
+ date: 2015-07-13
+ description: |
+ Missing anchor in generated regex for rack-cors before 0.4.1
+ allows a malicious third-party site to perform CORS requests.
+ If the configuration were intended to allow only the trusted
+ example.com domain name and not the malicious example.net domain name,
+ then example.com.example.net (as well as example.com-example.net) would
+ be inadvertently allowed.
+ cvss_v2: 6.8
+ cvss_v3: 8.8
+ patched_versions:
+ - ">= 0.4.1"
+ related:
+ url:
+ - https://github.com/cyu/rack-cors/issues/86
+ - http://seclists.org/fulldisclosure/2017/Jul/22
+---
diff --git a/advisories/_posts/2015-07-17-OSVDB-126331.md b/advisories/_posts/2015-07-17-OSVDB-126331.md
new file mode 100644
index 00000000..2546d521
--- /dev/null
+++ b/advisories/_posts/2015-07-17-OSVDB-126331.md
@@ -0,0 +1,28 @@
+---
+layout: advisory
+title: 'OSVDB-126331 (sidekiq-pro): Sidekiq Pro Gem for Ruby CSRF in Job Filtering'
+comments: false
+categories:
+- sidekiq-pro
+advisory:
+ gem: sidekiq-pro
+ osvdb: 126331
+ url: https://github.com/sidekiq/sidekiq/blob/main/Pro-Changes.md#206-193
+ title: Sidekiq Pro Gem for Ruby CSRF in Job Filtering
+ date: 2015-07-17
+ description: |
+ Sidekiq::Web job filtering lacks CSRF protection.
+ This issue is related to OSVDB-125675.
+ patched_versions:
+ - "~> 1.9.3"
+ - ">= 2.0.6"
+ related:
+ osvdb:
+ - 125675
+ url:
+ - https://github.com/sidekiq/sidekiq/blob/main/Pro-Changes.md#206-193
+ - https://github.com/sidekiq/sidekiq/issues/2442
+ - https://github.com/sidekiq/sidekiq/issues/2467
+ - https://github.com/rubysec/ruby-advisory-db/pull/201
+ - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQPRO-20234
+---
diff --git a/advisories/_posts/2015-07-20-OSVDB-125701.md b/advisories/_posts/2015-07-20-OSVDB-125701.md
new file mode 100644
index 00000000..8884d8a4
--- /dev/null
+++ b/advisories/_posts/2015-07-20-OSVDB-125701.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'OSVDB-125701 (spree): Spree RABL templates rendering allows Arbitrary Code
+ Execution and File Disclosure'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ osvdb: 125701
+ url: https://web.archive.org/web/20160331140223/https://spreecommerce.com/blog/security-updates-2015-7-20
+ title: Spree RABL templates rendering allows Arbitrary Code Execution and File Disclosure
+ date: 2015-07-20
+ description: |
+ Spree contains a flaw where the rendering of arbitrary RABL templates
+ allows for execution arbitrary files on the host system, as well as
+ disclosing the existence of files on the system.
+ patched_versions:
+ - "~> 2.2.12"
+ - "~> 2.3.11"
+ - "~> 2.4.8"
+ - ">= 3.0.2"
+ related:
+ url:
+ - https://web.archive.org/web/20160331140223/https://spreecommerce.com/blog/security-updates-2015-7-20
+ - https://github.com/rubysec/bundler-audit/issues/106
+---
diff --git a/advisories/_posts/2015-07-21-CVE-2015-5378.md b/advisories/_posts/2015-07-21-CVE-2015-5378.md
new file mode 100644
index 00000000..dbb93642
--- /dev/null
+++ b/advisories/_posts/2015-07-21-CVE-2015-5378.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2015-5378 (logstash-core): Logstash: SSL/TLS FREAK Attack'
+comments: false
+categories:
+- logstash-core
+advisory:
+ gem: logstash-core
+ cve: 2015-5378
+ ghsa: g6rc-3fpq-w2gr
+ url: https://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html
+ title: 'Logstash: SSL/TLS FREAK Attack'
+ date: 2015-07-21
+ description: |
+ Logstash: SSL/TLS FREAK Attack: Logstash 1.5.x before 1.5.3 and
+ 1.4.x before 1.4.4 allows remote attackers to read communications
+ between Logstash Forwarder agent and Logstash server.
+ cvss_v2: 5.0
+ cvss_v3: 7.5
+ patched_versions:
+ - "~> 1.4.4"
+ - ">= 1.5.3"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-5378
+ - https://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/factoring-attack-rsa-export-keys-freak/ruby/sid-1745/summary
+ - https://github.com/rubysec/ruby-advisory-db/issues/238
+ - https://www.elastic.co/community/security
+ - https://github.com/advisories/GHSA-g6rc-3fpq-w2gr
+ - https://web.archive.org/web/20181211080524/http://www.securityfocus.com/bid/76015
+---
diff --git a/advisories/_posts/2015-07-21-CVE-2015-8857.md b/advisories/_posts/2015-07-21-CVE-2015-8857.md
new file mode 100644
index 00000000..ea14f5d0
--- /dev/null
+++ b/advisories/_posts/2015-07-21-CVE-2015-8857.md
@@ -0,0 +1,40 @@
+---
+layout: advisory
+title: 'CVE-2015-8857 (uglifier): uglifier incorrectly handles non-boolean comparisons
+ during minification'
+comments: false
+categories:
+- uglifier
+advisory:
+ gem: uglifier
+ cve: 2015-8857
+ osvdb: 126747
+ ghsa: 34r7-q49f-h37c
+ url: https://github.com/mishoo/UglifyJS2/issues/751
+ title: uglifier incorrectly handles non-boolean comparisons during minification
+ date: 2015-07-21
+ description: |
+ The upstream library for the Ruby uglifier gem, UglifyJS, is
+ affected by a vulnerability that allows a specially crafted
+ Javascript file to have altered functionality after minification.
+
+ This bug, found in UglifyJS versions 2.4.23 and earlier, was demonstrated
+ to allow potentially malicious code to be hidden within secure code,
+ and activated by the minification process.
+
+ For more information, consult:
+ * https://zyan.scripts.mit.edu/blog/backdooring-js
+
+ * CWE: 254 - 7PK - Security Features
+ cvss_v2: 7.5
+ cvss_v3: 9.8
+ patched_versions:
+ - ">= 2.7.2"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-8857
+ - https://github.com/mishoo/UglifyJS/issues/751
+ - https://blog.azuki.vip/backdooring-js
+ - https://www.openwall.com/lists/oss-security/2016/04/20/11
+ - https://github.com/advisories/GHSA-34r7-q49f-h37c
+---
diff --git a/advisories/_posts/2015-07-21-OSVDB-126747.md b/advisories/_posts/2015-07-21-OSVDB-126747.md
new file mode 100644
index 00000000..e871891a
--- /dev/null
+++ b/advisories/_posts/2015-07-21-OSVDB-126747.md
@@ -0,0 +1,27 @@
+---
+layout: advisory
+title: 'OSVDB-126747 (uglifier): uglifier incorrectly handles non-boolean comparisons
+ during minification'
+comments: false
+categories:
+- uglifier
+advisory:
+ gem: uglifier
+ osvdb: 126747
+ url: https://github.com/mishoo/UglifyJS2/issues/751
+ title: uglifier incorrectly handles non-boolean comparisons during minification
+ date: 2015-07-21
+ description: |2
+
+ The upstream library for the Ruby uglifier gem, UglifyJS, is
+ affected by a vulnerability that allows a specially crafted
+ Javascript file to have altered functionality after minification.
+
+ This bug, found in UglifyJS versions 2.4.23 and earlier, was demonstrated
+ to allow potentially malicious code to be hidden within secure code,
+ and activated by the minification process.
+
+ For more information, consult: https://zyan.scripts.mit.edu/blog/backdooring-js/
+ patched_versions:
+ - ">= 2.7.2"
+---
diff --git a/advisories/_posts/2015-07-28-OSVDB-125699.md b/advisories/_posts/2015-07-28-OSVDB-125699.md
new file mode 100644
index 00000000..f72cad19
--- /dev/null
+++ b/advisories/_posts/2015-07-28-OSVDB-125699.md
@@ -0,0 +1,30 @@
+---
+layout: advisory
+title: 'OSVDB-125699 (spree): Spree RABL templates rendering allows Arbitrary Code
+ Execution and File Disclosure'
+comments: false
+categories:
+- spree
+advisory:
+ gem: spree
+ osvdb: 125699
+ url: https://web.archive.org/web/20160331133641/spreecommerce.com/blog/security-updates-2015-7-28
+ title: Spree RABL templates rendering allows Arbitrary Code Execution and File Disclosure
+ date: 2015-07-28
+ description: |
+ Spree contains a flaw where the rendering of arbitrary RABL templates
+ allows for execution arbitrary files on the host system, as well as
+ disclosing the existence of files on the system.
+ This is a different issue than OSVDB-125701.
+ patched_versions:
+ - "~> 2.2.13"
+ - "~> 2.3.12"
+ - "~> 2.4.9"
+ - ">= 3.0.3"
+ related:
+ osvdb:
+ - 125701
+ url:
+ - https://github.com/rubysec/bundler-audit/issues/106
+ - https://security.snyk.io/vuln/SNYK-RUBY-SPREE-20237
+---
diff --git a/advisories/_posts/2015-08-20-CVE-2015-5619.md b/advisories/_posts/2015-08-20-CVE-2015-5619.md
new file mode 100644
index 00000000..183a649d
--- /dev/null
+++ b/advisories/_posts/2015-08-20-CVE-2015-5619.md
@@ -0,0 +1,32 @@
+---
+layout: advisory
+title: 'CVE-2015-5619 (logstash-core): Logstash: Man-In-The Middle attack'
+comments: false
+categories:
+- logstash-core
+advisory:
+ gem: logstash-core
+ cve: 2015-5619
+ ghsa: 68pf-743m-hv2w
+ url: https://www.elastic.co/blog/logstash-1-5-4-and-1-4-5-released
+ title: 'Logstash: Man-In-The Middle attack'
+ date: 2015-08-20
+ description: |
+ Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack
+ output or the Logstash forwarder does not validate SSL/TLS certificates
+ from the Logstash server, which might allow attackers to obtain
+ sensitive information via a man-in-the-middle attack.
+ cvss_v2: 4.3
+ cvss_v3: 5.9
+ patched_versions:
+ - "~> 1.4.5"
+ - ">= 1.5.4"
+ related:
+ url:
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-5619
+ - https://www.elastic.co/blog/logstash-1-5-4-and-1-4-5-released
+ - https://www.elastic.co/community/security
+ - https://packetstormsecurity.com/files/133269/Logstash-1.5.3-Man-In-The-Middle.html
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/man-middle-mitm-attacks/ruby/sid-1798/summary
+ - https://github.com/advisories/GHSA-68pf-743m-hv2w
+---
diff --git a/advisories/_posts/2015-08-24-OSVDB-131671.md b/advisories/_posts/2015-08-24-OSVDB-131671.md
new file mode 100644
index 00000000..b645be2b
--- /dev/null
+++ b/advisories/_posts/2015-08-24-OSVDB-131671.md
@@ -0,0 +1,34 @@
+---
+layout: advisory
+title: 'OSVDB-131671 (handlebars-source): handlebars.js - quoteless attributes in
+ templates can lead to XSS'
+comments: false
+categories:
+- handlebars-source
+advisory:
+ gem: handlebars-source
+ osvdb: 131671
+ url: https://security.snyk.io/vuln/SNYK-RUBY-HANDLEBARSSOURCE-20238
+ title: handlebars.js - quoteless attributes in templates can lead to XSS
+ date: 2015-08-24
+ description: |
+ The upstream 'handlebars' node.js module was found to not properly
+ escape equals (=) signs, leading to possible content injection
+ via attributes in templates.
+
+ Example:
+ * Template: