class Brakeman::CheckJSONEncoding
Public Instance Methods
has_workaround?()
click to toggle source
# File lib/brakeman/checks/check_json_encoding.rb, line 33 def has_workaround? workaround = s(:module, :ActiveSupport, s(:module, :JSON, s(:module, :Encoding, s(:call, nil, :private), s(:class, :EscapedString, nil, s(:defn, :to_s, s(:args), s(:self)))))) tracker.initializers.any? do |_name, initializer| initializer == workaround end end
run_check()
click to toggle source
# File lib/brakeman/checks/check_json_encoding.rb, line 8 def run_check if (version_between? "4.1.0", "4.1.10" or version_between? "4.2.0", "4.2.1") and not has_workaround? message = msg(msg_version(rails_version), " does not encode JSON keys ", msg_cve("CVE-2015-3226"), ". Upgrade to ") if version_between? "4.1.0", "4.1.10" message << msg_version("4.1.11") else message << msg_version("4.2.2") end if tracker.find_call(:methods => [:to_json, :encode]).any? confidence = :high else confidence = :medium end warn :warning_type => "Cross-Site Scripting", :warning_code => :CVE_2015_3226, :message => message, :confidence => confidence, :gem_info => gemfile_or_environment, :link_path => "https://groups.google.com/d/msg/rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ" end end