1
1
[
2
- {
3
- "categories" : [
4
- " Security"
5
- ],
6
- "check_name" : " Insecure Source" ,
7
- "content" : {
8
- "body" : " "
9
- },
10
- "description" : " Insecure Source URI found: http://rubygems.org/" ,
11
- "location" : {
12
- "lines" : {
13
- "begin" : 2 ,
14
- "end" : 2
15
- },
16
- "path" : " Gemfile.lock"
17
- },
18
- "remediation_points" : 5000000 ,
19
- "severity" : " normal" ,
20
- "type" : " Issue" ,
21
- "fingerprint" : " dc0e043c56c03c2ada6c448f1958cfcb"
22
- },
23
- {
24
- "categories" : [
25
- " Security"
26
- ],
27
- "check_name" : " Insecure Dependency" ,
28
- "content" : {
29
- "body" : " **Advisory**: CVE-2014-7819\n\n **Criticality**: Medium\n\n **URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY\n\n **Solution**: upgrade to ~> 2.0.5, ~> 2.1.4, ~> 2.2.3, ~> 2.3.3, ~> 2.4.6, ~> 2.5.1, ~> 2.7.1, ~> 2.8.3, ~> 2.9.4, ~> 2.10.2, ~> 2.11.3, ~> 2.12.3, >= 3.0.0.beta.3"
30
- },
31
- "description" : " Arbitrary file existence disclosure in Sprockets" ,
32
- "location" : {
33
- "lines" : {
34
- "begin" : 7 ,
35
- "end" : 7
36
- },
37
- "path" : " Gemfile.lock"
38
- },
39
- "remediation_points" : 500000 ,
40
- "severity" : " normal" ,
41
- "type" : " Issue" ,
42
- "fingerprint" : " d46fd8d3ccc9459f81fb4724ef158fdf"
43
- }
44
- ]
2
+ {
3
+ "categories" : [
4
+ " Security"
5
+ ],
6
+ "check_name" : " Insecure Source" ,
7
+ "content" : {
8
+ "body" : " "
9
+ },
10
+ "description" : " Insecure Source URI found: http://rubygems.org/" ,
11
+ "location" : {
12
+ "lines" : {
13
+ "begin" : 2 ,
14
+ "end" : 2
15
+ },
16
+ "path" : " Gemfile.lock"
17
+ },
18
+ "remediation_points" : 5000000 ,
19
+ "severity" : " normal" ,
20
+ "type" : " Issue" ,
21
+ "fingerprint" : " dc0e043c56c03c2ada6c448f1958cfcb"
22
+ },
23
+ {
24
+ "categories" : [
25
+ " Security"
26
+ ],
27
+ "check_name" : " Insecure Dependency" ,
28
+ "content" : {
29
+ "body" : " **Advisory**: CVE-2022-30123\n\n **Criticality**: Critical\n\n **URL**: https://groups.google.com/g/ruby-security-ann/c/LWB10kWzag8\n\n **Solution**: upgrade to >= 2.0.9.1, ~> 2.0.9, >= 2.1.4.1, ~> 2.1.4, >= 2.2.3.1"
30
+ },
31
+ "description" : " Possible shell escape sequence injection vulnerability in Rack" ,
32
+ "location" : {
33
+ "path" : " Gemfile.lock" ,
34
+ "lines" : {
35
+ "begin" : 6 ,
36
+ "end" : 6
37
+ }
38
+ },
39
+ "remediation_points" : 50000000 ,
40
+ "severity" : " normal" ,
41
+ "type" : " Issue" ,
42
+ "fingerprint" : " 6a376055eeca86411f1c0ed705b3b98a"
43
+ },
44
+ {
45
+ "categories" : [
46
+ " Security"
47
+ ],
48
+ "check_name" : " Insecure Dependency" ,
49
+ "content" : {
50
+ "body" : " **Advisory**: CVE-2022-30122\n\n **Criticality**: High\n\n **URL**: https://groups.google.com/g/ruby-security-ann/c/L2Axto442qk\n\n **Solution**: upgrade to >= 2.0.9.1, ~> 2.0.9, >= 2.1.4.1, ~> 2.1.4, >= 2.2.3.1"
51
+ },
52
+ "description" : " Denial of Service Vulnerability in Rack Multipart Parsing" ,
53
+ "location" : {
54
+ "path" : " Gemfile.lock" ,
55
+ "lines" : {
56
+ "begin" : 6 ,
57
+ "end" : 6
58
+ }
59
+ },
60
+ "remediation_points" : 50000000 ,
61
+ "severity" : " critical" ,
62
+ "type" : " Issue" ,
63
+ "fingerprint" : " d8aa79ebf630c6b8a4d5cf2f01286f9c"
64
+ },
65
+ {
66
+ "categories" : [
67
+ " Security"
68
+ ],
69
+ "check_name" : " Insecure Dependency" ,
70
+ "content" : {
71
+ "body" : " **Advisory**: CVE-2020-8161\n\n **Criticality**: High\n\n **URL**: https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA\n\n **Solution**: upgrade to ~> 2.1.3, >= 2.2.0"
72
+ },
73
+ "description" : " Directory traversal in Rack::Directory app bundled with Rack" ,
74
+ "location" : {
75
+ "path" : " Gemfile.lock" ,
76
+ "lines" : {
77
+ "begin" : 6 ,
78
+ "end" : 6
79
+ }
80
+ },
81
+ "remediation_points" : 50000000 ,
82
+ "severity" : " critical" ,
83
+ "type" : " Issue" ,
84
+ "fingerprint" : " bce85eaea420588144241f29821cb78d"
85
+ },
86
+ {
87
+ "categories" : [
88
+ " Security"
89
+ ],
90
+ "check_name" : " Insecure Dependency" ,
91
+ "content" : {
92
+ "body" : " **Advisory**: CVE-2020-8184\n\n **Criticality**: High\n\n **URL**: https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak\n\n **Solution**: upgrade to ~> 2.1.4, >= 2.2.3"
93
+ },
94
+ "description" : " Percent-encoded cookies can be used to overwrite existing prefixed cookie names" ,
95
+ "location" : {
96
+ "path" : " Gemfile.lock" ,
97
+ "lines" : {
98
+ "begin" : 6 ,
99
+ "end" : 6
100
+ }
101
+ },
102
+ "remediation_points" : 50000000 ,
103
+ "severity" : " critical" ,
104
+ "type" : " Issue" ,
105
+ "fingerprint" : " 20ae609f117abfb10d58ab4038bbc649"
106
+ },
107
+ {
108
+ "categories" : [
109
+ " Security"
110
+ ],
111
+ "check_name" : " Insecure Dependency" ,
112
+ "content" : {
113
+ "body" : " **Advisory**: CVE-2019-16782\n\n **Criticality**: Medium\n\n **URL**: https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3\n\n **Solution**: upgrade to ~> 1.6.12, >= 2.0.8"
114
+ },
115
+ "description" : " Possible information leak / session hijack vulnerability" ,
116
+ "location" : {
117
+ "path" : " Gemfile.lock" ,
118
+ "lines" : {
119
+ "begin" : 6 ,
120
+ "end" : 6
121
+ }
122
+ },
123
+ "remediation_points" : 5000000 ,
124
+ "severity" : " normal" ,
125
+ "type" : " Issue" ,
126
+ "fingerprint" : " bac4b040969df754dc593b82482e394f"
127
+ },
128
+ {
129
+ "categories" : [
130
+ " Security"
131
+ ],
132
+ "check_name" : " Insecure Dependency" ,
133
+ "content" : {
134
+ "body" : " **Advisory**: CVE-2018-16471\n\n **URL**: https://groups.google.com/forum/#!topic/ruby-security-ann/NAalCee8n6o\n\n **Solution**: upgrade to ~> 1.6.11, >= 2.0.6"
135
+ },
136
+ "description" : " Possible XSS vulnerability in Rack" ,
137
+ "location" : {
138
+ "path" : " Gemfile.lock" ,
139
+ "lines" : {
140
+ "begin" : 6 ,
141
+ "end" : 6
142
+ }
143
+ },
144
+ "remediation_points" : 5000000 ,
145
+ "severity" : " normal" ,
146
+ "type" : " Issue" ,
147
+ "fingerprint" : " 5bfd48cd4526301acae4c4f98e8090e8"
148
+ },
149
+ {
150
+ "categories" : [
151
+ " Security"
152
+ ],
153
+ "check_name" : " Insecure Dependency" ,
154
+ "content" : {
155
+ "body" : " **Advisory**: CVE-2014-7819\n\n **Criticality**: Medium\n\n **URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY\n\n **Solution**: upgrade to ~> 2.0.5, ~> 2.1.4, ~> 2.2.3, ~> 2.3.3, ~> 2.4.6, ~> 2.5.1, ~> 2.7.1, ~> 2.8.3, ~> 2.9.4, ~> 2.10.2, ~> 2.11.3, ~> 2.12.3, >= 3.0.0.beta.3"
156
+ },
157
+ "description" : " CVE-2014-7819 rubygem-sprockets: arbitrary file existence disclosure" ,
158
+ "location" : {
159
+ "path" : " Gemfile.lock" ,
160
+ "lines" : {
161
+ "begin" : 7 ,
162
+ "end" : 7
163
+ }
164
+ },
165
+ "remediation_points" : 500000 ,
166
+ "severity" : " normal" ,
167
+ "type" : " Issue" ,
168
+ "fingerprint" : " d46fd8d3ccc9459f81fb4724ef158fdf"
169
+ },
170
+ {
171
+ "categories" : [
172
+ " Security"
173
+ ],
174
+ "check_name" : " Insecure Dependency" ,
175
+ "content" : {
176
+ "body" : " **Advisory**: CVE-2018-3760\n\n **Criticality**: High\n\n **URL**: https://groups.google.com/forum/#!topic/ruby-security-ann/2S9Pwz2i16k\n\n **Solution**: upgrade to < 3.0.0, >= 2.12.5, < 4.0.0, >= 3.7.2, >= 4.0.0.beta8"
177
+ },
178
+ "description" : " Path Traversal in Sprockets" ,
179
+ "location" : {
180
+ "path" : " Gemfile.lock" ,
181
+ "lines" : {
182
+ "begin" : 7 ,
183
+ "end" : 7
184
+ }
185
+ },
186
+ "remediation_points" : 5000000 ,
187
+ "severity" : " critical" ,
188
+ "type" : " Issue" ,
189
+ "fingerprint" : " 3e574413f7502654bc63250b9b3b29d7"
190
+ }
191
+ ]
0 commit comments