class Brakeman::CheckForgerySetting

Checks that protect_from_forgery is set in the ApplicationController.

Also warns for CSRF weakness in certain versions of Rails: groups.google.com/group/rubyonrails-security/browse_thread/thread/2d95a3cc23e03665

Public Instance Methods

check_cve_2011_0447() click to toggle source
# File lib/brakeman/checks/check_forgery_setting.rb, line 62
def check_cve_2011_0447
  @warned_cve_2011_0447 ||= false
  return if @warned_cve_2011_0447

  if version_between? "2.1.0", "2.3.10"
    new_version = "2.3.11"
  elsif version_between? "3.0.0", "3.0.3"
    new_version = "3.0.4"
  else
    return
  end

  @warned_cve_2011_0447 = true # only warn once

  csrf_warning :warning_code => :CVE_2011_0447,
    :message => msg("CSRF protection is flawed in unpatched versions of ", msg_version(rails_version), " ", msg_cve("CVE-2011-0447"), ". Upgrade to ", msg_version(new_version), " or apply patches as needed"),
    :gem_info => gemfile_or_environment,
    :file => nil,
    :link_path => "https://groups.google.com/d/topic/rubyonrails-security/LZWjzCPgNmU/discussion",
    :cwe_id => [352]
end
csrf_warning(opts) click to toggle source
# File lib/brakeman/checks/check_forgery_setting.rb, line 51
def csrf_warning opts
  opts = {
    :controller => :ApplicationController,
    :warning_type => "Cross-Site Request Forgery",
    :confidence => :high,
    :cwe_id => [352]
  }.merge opts

  warn opts
end
run_check() click to toggle source
# File lib/brakeman/checks/check_forgery_setting.rb, line 12
def run_check
  return if tracker.config.default_protect_from_forgery?

  tracker.controllers
  .select { |_, controller| controller.parent == :"ActionController::Base" }
  .each do |name, controller|
    if controller and not controller.protect_from_forgery?
      csrf_warning :controller => name,
        :warning_code => :csrf_protection_missing,
        :message => msg(msg_code("protect_from_forgery"), " should be called in ", msg_code(name)),
        :file => controller.file,
        :line => controller.top_line
    elsif version_between? "4.0.0", "100.0.0" and forgery_opts = controller.options[:protect_from_forgery]
      unless forgery_opts.is_a?(Array) and sexp?(forgery_opts.first) and
        access_arg = hash_access(forgery_opts.first.first_arg, :with) and symbol? access_arg and
        access_arg.value == :exception

        args = {
          :controller => name,
          :warning_type => "Cross-Site Request Forgery",
          :warning_code => :csrf_not_protected_by_raising_exception,
          :message => msg(msg_code("protect_from_forgery"), " should be configured with ", msg_code("with: :exception")),
          :confidence => :medium,
          :file => controller.file
        }

        args.merge!(:code => forgery_opts.first) if forgery_opts.is_a?(Array)

        csrf_warning args
      end

    end

    if controller.options[:protect_from_forgery]
      check_cve_2011_0447
    end
  end
end