Skip to content

Commit a3bba6a

Browse files
authored
QUA-884: update database version (#77)
* update database version
1 parent 1b92ca6 commit a3bba6a

File tree

5 files changed

+3484
-1521
lines changed

5 files changed

+3484
-1521
lines changed

.circleci/config.yml

+15-5
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,21 @@ jobs:
1111
- run: make test
1212

1313
release_images:
14-
docker:
15-
- image: circleci/python:latest
14+
machine:
15+
docker_layer_caching: true
16+
working_directory: ~/codeclimate/codeclimate-bundler-audit
1617
steps:
1718
- checkout
18-
- setup_remote_docker:
19-
docker_layer_caching: true
20-
- run: docker login -u _json_key -p "$GCR_JSON_KEY" us.gcr.io
19+
- run:
20+
name: Validate owner
21+
command: |
22+
if [ "$CIRCLE_PROJECT_USERNAME" -ne "codeclimate" ]
23+
then
24+
echo "Skipping release for non-codeclimate branches"
25+
circleci step halt
26+
fi
2127
- run: make image
28+
- run: echo "$GCR_JSON_KEY" | docker login -u _json_key --password-stdin us.gcr.io
2229
- run: bin/deploy
2330

2431

@@ -30,6 +37,9 @@ workflows:
3037
- release_images:
3138
requires:
3239
- build_and_test
40+
filters:
41+
branches:
42+
only: /master|channel\/[\w-]+/
3343
notify:
3444
webhooks:
3545
- url: https://cc-slack-proxy.herokuapp.com/circle

DATABASE_VERSION

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
Thu Apr 8 11:56:16 -03 2021
1+
Thu Jan 19 11:41:48 -03 2023
+190-43
Original file line numberDiff line numberDiff line change
@@ -1,44 +1,191 @@
11
[
2-
{
3-
"categories": [
4-
"Security"
5-
],
6-
"check_name": "Insecure Source",
7-
"content": {
8-
"body": ""
9-
},
10-
"description": "Insecure Source URI found: http://rubygems.org/",
11-
"location": {
12-
"lines": {
13-
"begin": 2,
14-
"end": 2
15-
},
16-
"path": "Gemfile.lock"
17-
},
18-
"remediation_points": 5000000,
19-
"severity": "normal",
20-
"type": "Issue",
21-
"fingerprint": "dc0e043c56c03c2ada6c448f1958cfcb"
22-
},
23-
{
24-
"categories": [
25-
"Security"
26-
],
27-
"check_name": "Insecure Dependency",
28-
"content": {
29-
"body": "**Advisory**: CVE-2014-7819\n\n**Criticality**: Medium\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY\n\n**Solution**: upgrade to ~> 2.0.5, ~> 2.1.4, ~> 2.2.3, ~> 2.3.3, ~> 2.4.6, ~> 2.5.1, ~> 2.7.1, ~> 2.8.3, ~> 2.9.4, ~> 2.10.2, ~> 2.11.3, ~> 2.12.3, >= 3.0.0.beta.3"
30-
},
31-
"description": "Arbitrary file existence disclosure in Sprockets",
32-
"location": {
33-
"lines": {
34-
"begin": 7,
35-
"end": 7
36-
},
37-
"path": "Gemfile.lock"
38-
},
39-
"remediation_points": 500000,
40-
"severity": "normal",
41-
"type": "Issue",
42-
"fingerprint": "d46fd8d3ccc9459f81fb4724ef158fdf"
43-
}
44-
]
2+
{
3+
"categories": [
4+
"Security"
5+
],
6+
"check_name": "Insecure Source",
7+
"content": {
8+
"body": ""
9+
},
10+
"description": "Insecure Source URI found: http://rubygems.org/",
11+
"location": {
12+
"lines": {
13+
"begin": 2,
14+
"end": 2
15+
},
16+
"path": "Gemfile.lock"
17+
},
18+
"remediation_points": 5000000,
19+
"severity": "normal",
20+
"type": "Issue",
21+
"fingerprint": "dc0e043c56c03c2ada6c448f1958cfcb"
22+
},
23+
{
24+
"categories": [
25+
"Security"
26+
],
27+
"check_name": "Insecure Dependency",
28+
"content": {
29+
"body": "**Advisory**: CVE-2022-30123\n\n**Criticality**: Critical\n\n**URL**: https://groups.google.com/g/ruby-security-ann/c/LWB10kWzag8\n\n**Solution**: upgrade to >= 2.0.9.1, ~> 2.0.9, >= 2.1.4.1, ~> 2.1.4, >= 2.2.3.1"
30+
},
31+
"description": "Possible shell escape sequence injection vulnerability in Rack",
32+
"location": {
33+
"path": "Gemfile.lock",
34+
"lines": {
35+
"begin": 6,
36+
"end": 6
37+
}
38+
},
39+
"remediation_points": 50000000,
40+
"severity": "normal",
41+
"type": "Issue",
42+
"fingerprint": "6a376055eeca86411f1c0ed705b3b98a"
43+
},
44+
{
45+
"categories": [
46+
"Security"
47+
],
48+
"check_name": "Insecure Dependency",
49+
"content": {
50+
"body": "**Advisory**: CVE-2022-30122\n\n**Criticality**: High\n\n**URL**: https://groups.google.com/g/ruby-security-ann/c/L2Axto442qk\n\n**Solution**: upgrade to >= 2.0.9.1, ~> 2.0.9, >= 2.1.4.1, ~> 2.1.4, >= 2.2.3.1"
51+
},
52+
"description": "Denial of Service Vulnerability in Rack Multipart Parsing",
53+
"location": {
54+
"path": "Gemfile.lock",
55+
"lines": {
56+
"begin": 6,
57+
"end": 6
58+
}
59+
},
60+
"remediation_points": 50000000,
61+
"severity": "critical",
62+
"type": "Issue",
63+
"fingerprint": "d8aa79ebf630c6b8a4d5cf2f01286f9c"
64+
},
65+
{
66+
"categories": [
67+
"Security"
68+
],
69+
"check_name": "Insecure Dependency",
70+
"content": {
71+
"body": "**Advisory**: CVE-2020-8161\n\n**Criticality**: High\n\n**URL**: https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA\n\n**Solution**: upgrade to ~> 2.1.3, >= 2.2.0"
72+
},
73+
"description": "Directory traversal in Rack::Directory app bundled with Rack",
74+
"location": {
75+
"path": "Gemfile.lock",
76+
"lines": {
77+
"begin": 6,
78+
"end": 6
79+
}
80+
},
81+
"remediation_points": 50000000,
82+
"severity": "critical",
83+
"type": "Issue",
84+
"fingerprint": "bce85eaea420588144241f29821cb78d"
85+
},
86+
{
87+
"categories": [
88+
"Security"
89+
],
90+
"check_name": "Insecure Dependency",
91+
"content": {
92+
"body": "**Advisory**: CVE-2020-8184\n\n**Criticality**: High\n\n**URL**: https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak\n\n**Solution**: upgrade to ~> 2.1.4, >= 2.2.3"
93+
},
94+
"description": "Percent-encoded cookies can be used to overwrite existing prefixed cookie names",
95+
"location": {
96+
"path": "Gemfile.lock",
97+
"lines": {
98+
"begin": 6,
99+
"end": 6
100+
}
101+
},
102+
"remediation_points": 50000000,
103+
"severity": "critical",
104+
"type": "Issue",
105+
"fingerprint": "20ae609f117abfb10d58ab4038bbc649"
106+
},
107+
{
108+
"categories": [
109+
"Security"
110+
],
111+
"check_name": "Insecure Dependency",
112+
"content": {
113+
"body": "**Advisory**: CVE-2019-16782\n\n**Criticality**: Medium\n\n**URL**: https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3\n\n**Solution**: upgrade to ~> 1.6.12, >= 2.0.8"
114+
},
115+
"description": "Possible information leak / session hijack vulnerability",
116+
"location": {
117+
"path": "Gemfile.lock",
118+
"lines": {
119+
"begin": 6,
120+
"end": 6
121+
}
122+
},
123+
"remediation_points": 5000000,
124+
"severity": "normal",
125+
"type": "Issue",
126+
"fingerprint": "bac4b040969df754dc593b82482e394f"
127+
},
128+
{
129+
"categories": [
130+
"Security"
131+
],
132+
"check_name": "Insecure Dependency",
133+
"content": {
134+
"body": "**Advisory**: CVE-2018-16471\n\n**URL**: https://groups.google.com/forum/#!topic/ruby-security-ann/NAalCee8n6o\n\n**Solution**: upgrade to ~> 1.6.11, >= 2.0.6"
135+
},
136+
"description": "Possible XSS vulnerability in Rack",
137+
"location": {
138+
"path": "Gemfile.lock",
139+
"lines": {
140+
"begin": 6,
141+
"end": 6
142+
}
143+
},
144+
"remediation_points": 5000000,
145+
"severity": "normal",
146+
"type": "Issue",
147+
"fingerprint": "5bfd48cd4526301acae4c4f98e8090e8"
148+
},
149+
{
150+
"categories": [
151+
"Security"
152+
],
153+
"check_name": "Insecure Dependency",
154+
"content": {
155+
"body": "**Advisory**: CVE-2014-7819\n\n**Criticality**: Medium\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY\n\n**Solution**: upgrade to ~> 2.0.5, ~> 2.1.4, ~> 2.2.3, ~> 2.3.3, ~> 2.4.6, ~> 2.5.1, ~> 2.7.1, ~> 2.8.3, ~> 2.9.4, ~> 2.10.2, ~> 2.11.3, ~> 2.12.3, >= 3.0.0.beta.3"
156+
},
157+
"description": "CVE-2014-7819 rubygem-sprockets: arbitrary file existence disclosure",
158+
"location": {
159+
"path": "Gemfile.lock",
160+
"lines": {
161+
"begin": 7,
162+
"end": 7
163+
}
164+
},
165+
"remediation_points": 500000,
166+
"severity": "normal",
167+
"type": "Issue",
168+
"fingerprint": "d46fd8d3ccc9459f81fb4724ef158fdf"
169+
},
170+
{
171+
"categories": [
172+
"Security"
173+
],
174+
"check_name": "Insecure Dependency",
175+
"content": {
176+
"body": "**Advisory**: CVE-2018-3760\n\n**Criticality**: High\n\n**URL**: https://groups.google.com/forum/#!topic/ruby-security-ann/2S9Pwz2i16k\n\n**Solution**: upgrade to < 3.0.0, >= 2.12.5, < 4.0.0, >= 3.7.2, >= 4.0.0.beta8"
177+
},
178+
"description": "Path Traversal in Sprockets",
179+
"location": {
180+
"path": "Gemfile.lock",
181+
"lines": {
182+
"begin": 7,
183+
"end": 7
184+
}
185+
},
186+
"remediation_points": 5000000,
187+
"severity": "critical",
188+
"type": "Issue",
189+
"fingerprint": "3e574413f7502654bc63250b9b3b29d7"
190+
}
191+
]

0 commit comments

Comments
 (0)